<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://vuln.today/articles/cve-2026-28289-poc-cve-2026-28289</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-27944-cve-2026-27944-nginx-ui-unauthenticated-backup-download-admin-tak</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-20079-poc-cve-2026-20079</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-21385-poc-cve-2026-21385</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-21510-poc-cve-2026-21510-cvss-88-important-windows-shell-security-featu</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-21533-poc-este-repositorio-contiene-una-herramienta-de-deteccion-para-l</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-20127-poc-an-exploit-for-the-cisco-catalyst-sd-wan-controller-authentic</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-33017-poc-the-vulnerability-in-langflow-181-and-earlier-allows-a-remote</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-3055-poc-low-impact-probe-for-citrix-netscaler-cve-2026-3055-saml-idp-m</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-2441-poc-demonstrate-a-proof-of-concept-exploit-for-cve-2026-2441-a-hig</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-33634-poc-companion-source-for-youtube-video-stop-mounting-dockersock-r</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-27180-poc-cve-2026-27180-majordomo-unauthenticated-rce</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-27174-poc-cve-2026-27174-an-unauthenticated-remote-code-execution-via-t</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-20131-poc-cve-2026-20131-poc</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-3288-cve-2026-3288-nginx-ingress-controller-configuration-injection-via</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-33017-cve-2026-33017-langflow-rce-exploited-in-20-hours-credentials-sto</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2025-71257-cve-2025-71258-cve-2025-71259-bmc-footprints-pre-auth-rce-chain-c</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2025-67034-cve-2025-67035-cve-2025-67036-lantronix-eds3000pseds5000-multiple</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2025-64487-cve-2026-28514-github-security-lab-ai-framework-discovers-80-vuln</loc>
    <lastmod>2026-04-09</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-22666-cve-2026-22666-dolibarr-dol_eval_standard-whitelist-bypass-rce-v2</loc>
    <lastmod>2026-04-08</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-2699-cve-2026-2699-progress-sharefile-authentication-bypass-detection-t</loc>
    <lastmod>2026-04-08</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-5281-cve-2026-5281-chrome-webgpu-use-after-free-poc-toolkit-scanner</loc>
    <lastmod>2026-04-08</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-3502-poc-herramienta-de-deteccion-para-cve-2026-3502-escanea-servidores</loc>
    <lastmod>2026-04-08</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-35616-poc-cve-2026-35616-check</loc>
    <lastmod>2026-04-08</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/threat-landscape-2026-04-06</loc>
    <lastmod>2026-04-06</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-35394-cve-2026-35394-ai-prompt-injection-enables-arbitrary-android-inte</loc>
    <lastmod>2026-04-06</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-25769-cve-2026-25769-wazuh-security-flaw-enables-trusted-systems-as-att</loc>
    <lastmod>2026-04-06</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-32186-cve-2026-32186-microsoft-bing-elevation-of-privilege-via-service</loc>
    <lastmod>2026-04-06</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-20093-cve-2026-20093-cisco-imc-authentication-bypass-enables-full-admin</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-22738-cve-2026-22738-unauthenticated-rce-via-spel-injection-in-spring-a</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-5271-cve-2026-5271-python-pymanager-module-hijacking-via-cwd-path-manip</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-2699-cve-2026-2701-progress-sharefile-storage-zone-pre-auth-rce-chain-c</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-24018-cve-2026-24018-symlink-race-condition-lpe-in-fortinet-forticlient</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-25769-cve-2026-25769-wazuh-rce-via-worker-node-privilege-escalation</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-33416-cve-2026-33636-critical-rce-and-uaf-flaws-in-libpng-cve-2026-3341</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-33701-cve-2026-33701-critical-rce-in-opentelemetry-java-agent-rmi-instr</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-1961-cve-2026-1961-rce-via-command-injection-in-foreman-websocket-proxy</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-33032-cve-2026-33032-nginx-ui-authentication-bypass-enables-unauthentic</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-33026-cve-2026-33026-critical-nginx-ui-backup-vulnerability-94-cvss-poc</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-3055-cve-2026-3055-part-2-multiple-memory-overread-vulnerabilities-in-c</loc>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/threat-landscape-2026-03-23</loc>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-3055-cve-2026-3055-citrix-netscaler-memory-overread-via-saml-idp-xml-pa</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-2256-cve-2026-2256-ai-agent-command-injection-via-unsafe-shell-executio</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-33696-cve-2026-33696-n8n-prototype-pollution-rce-in-xml-and-gsuite-admi</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-26123-cve-2026-26123-microsoft-authenticator-deep-link-hijacking-e-2</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-1281-cve-2026-1340-ivanti-epmm-pre-auth-rce-via-bash-script-injection-c</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-21902-juniper-ptx-series-unauthenticated-rce-via-cve-2026-21902-on-box</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-20643-cve-2026-20643-critical-webkit-navigation-api-bypass-exposes-appl</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://vuln.today/articles/cve-2026-32746-a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnet</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
</urlset>