<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://ironsmithintel.com</loc>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://ironsmithintel.com/hardening</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-flash-player</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-internet-explorer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-v8</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-office</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-win32k</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/synacor-zimbra-collaboration-suite-zcs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-coldfusion</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-acrobat-and-reader</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-java-se</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-exchange-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-reader-and-acrobat</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-vcenter-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/roundcube-webmail</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-tomcat</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mozilla-firefox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zoho-manageengine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sap-netweaver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-weblogic-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-word</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-fusion-middleware</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/android-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/solarwinds-web-help-desk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-small-business-rv160-rv260-rv340-and-rv345-series-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chrome</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/veeam-backup--replication</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rarlab-winrar</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-sharepoint</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/craft-cms-craft-cms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-adaptive-security-appliance-asa-and-firepower-threat-defense-ftd</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/android-pixel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gigabyte-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-photo-station</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-java-runtime-environment-jre</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-network-attached-storage-nas</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-active-directory</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/telemessage-tm-sgnl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-e-business-suite</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/crushftp-crushftp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dassault-systmes-delmia-apriso</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-edge</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/meta-platforms-whatsapp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sangoma-freepbx</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-endpoint-manager-mobile-epmm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/connectwise-screenconnect</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rails-ruby-on-rails</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/simplehelp-simplehelp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jetbrains-teamcity</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-activemq</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/smartertools-smartermail</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-ofbiz</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qlik-sense</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-adaptive-security-appliance-asa</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-confluence-data-center-and-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/roundcube-roundcube-webmail</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/veritas-backup-exec-agent</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mitel-mivoice-connect</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-silverlight</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mozilla-firefox-and-thunderbird</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-sql-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openssl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/putty</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-fortigate</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-xe</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/f5-big-ip</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-defender</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openplc-scadabr</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-directx-graphics-kernel-dxgkrnl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-graphics-device-interface-gdi</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mikrotik-routeros</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/watchguard-firebox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gladinet-centrestack-and-triofox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/osgeo-geoserver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cwp-control-web-panel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kentico-xperience-cms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kaseya-virtual-systemserver-administrator-vsa</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/grafana-labs-grafana</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sudo-sudo</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortra-goanywhere-mft</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-secure-firewall-adaptive-security-appliance-and-secure-firewall-threat-defense</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wing-ftp-server-wing-ftp-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/n-able-n-central</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/papercut-ngmf</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-identity-services-engine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sysaid-sysaid-on-prem</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/linux-kernel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-sd-wan-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-forticlient-ems</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/langflow-langflow</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-outlook</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-sharepoint-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-excel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/geovision-multiple-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-mojo</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sitecore-cms-and-experience-platform-xp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-esxi</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/servicenow-utah-vancouver-and-washington-dc-now-platform</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/advantive-veracore</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-whatsup-gold</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hitachi-vantara-pentaho-business-analytics-ba-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-agile-product-lifecycle-management-plm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/paessler-prtg-network-monitor</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/beyondtrust-privileged-remote-access-pra-and-remote-support-rs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mitel-micollab</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cleo-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cyberpersons-cyberpanel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-jira-server-and-data-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ptzoptics-pt30x-sdindi-cameras</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/draytek-vigorconnect</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dahua-ip-camera-firmware</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-commerce-and-magento-open-source</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/minio-minio</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-polkit</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortra-cobalt-strike</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/telerik-user-interface-ui-for-aspnet-ajax</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tibco-jasperreports</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/pear-archivetar</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-xml-core-services</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-powerpoint</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-flash-player-and-air</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-jboss</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/drupal-core</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dasan-gigabit-passive-optical-network-gpon-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/elastic-elasticsearch</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/exim-exim</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zabbix-frontend</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nodejs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sqlite</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openssh-for-windows</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-iis</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/palo-alto-pan-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--clfs-driver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--dwm-core-library</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-adc--netscaler-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-connect-secure</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--scripting-engine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--remote-desktop-client</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--remote-desktop-gateway-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-defender-for-identity</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/berriai-litellm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/teamviewer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-log4j</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/curl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/python</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openssh</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/git</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-moveit-transfer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zoom</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/winrar</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/winscp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/net-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-internet-explorer-and-edge</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ibm-websphere-application-server-and-server-hypervisor-edition</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-office-and-wordpad</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/primetek-primefaces-application</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/elastic-kibana</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fatpipe-warp-ipvpn-and-mpvpn-software</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zoho-desktop-central</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/realtek-jungle-software-development-kit-sdk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonatype-nexus-repository-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-solr</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-project</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-streaming-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows-cng-key-isolation-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wordpress-file-manager-plugin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wordpress-snap-creek-duplicator-plugin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wordpress-social-warfare-plugin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/embedthis-goahead</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-jboss-application-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-jboss-seam-2</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fuel-cms-fuel-cms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/pi-hole-adminlte</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mongodb-mongo-express</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zoho-manageengine-servicedesk-plus-sdp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mongodb-mongodb-and-mongodb-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/digiever-ds-2105-pro</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sierra-wireless-airlink-aleos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-edge-and-internet-explorer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/array-networks-arrayos-ag</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/meta-react-server-components</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gladinet-triofox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/broadcom-vmware-aria-operations-and-vmware-tools</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/xwiki-platform</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-commerce-and-magento</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/motex-lanscope-endpoint-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-experience-manager-aem-forms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/igel-igel-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/skysea-client-view</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-client-server-run-time-subsystem-csrss</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mozilla-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gnu-gnu-bash</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jenkins-jenkins</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/smartbedded-meteobridge</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/libraesva-email-security-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adminer-adminer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-smart-licensing-utility</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-smbv1</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/android-runtime</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sitecore-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/perl-exiftool</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/git-git</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-one</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-microsoft</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-sd-wan</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/palo-alto-networks-pan-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/webpros-cpanel--whm-and-wp2-wordpress-squared</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-823x</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/samsung-magicinfo-9-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/marimo-marimo</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/php-phpmailer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-sd-wan-manger</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kentico-kentico-xperience</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/quest-kace-systems-management-appliance-sma</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/looking-glass-multi-router-looking-glass-mrlg</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-visual-basic-for-applications-vba</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-acrobat</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trueconf-client</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-dawn</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-netscaler</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/aquasecurity-trivy</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/laravel-livewire</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-secure-firewall-management-center-fmc</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-skia</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/n8n-n8n</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/omnissa-workspace-one-uem</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-endpoint-manager-epm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hikvision-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rockwell-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-ios-and-ipados</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/broadcom-vmware-aria-operations</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qualcomm-multiple-chipsets</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-sd-wan</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-sd-wan-controller-and-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/soliton-systems-kk-filezen</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gitlab-gitlab</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dell-recoverpoint-for-virtual-machines-rp4vms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/synacor-zimbra-collaboration-suite</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/teamt5-threatsonar-anti-ransomware</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/beyondtrust-remote-support-rs-and-privileged-remote-access-pra</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/notepad-notepad</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ami-megarac-spx</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/react-native-community-cli</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gitlab-community-and-enterprise-editions</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gnu-inetutils</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wazuh-wazuh-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/broadcom-vmware-vcenter-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/synacor-zimbra-collaboration-suite-zcs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/versa-concerto</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vite-vitejs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/prettier-eslint-config-prettier</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-unified-communications-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gogs-gogs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hewlett-packard-enterprise-hpe-oneview</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-dwm-core-library</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-skype-for-business</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-streaming-service-proxy</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-net-core-and-visual-studio</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/erlang-erlangotp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-internet-explorer-scripting-engine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-task-scheduler</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-enhanced-cryptographic-provider</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-mshtml</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-net-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-configuration-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zkteco-biotime</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/srimax-output-messenger</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mdaemon-email-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/draytek-vigor-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/freetype-freetype</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/commvault-command-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/yiiframework-yii</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-http-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/broadcom-brocade-fabric-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qualitia-active-mail</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/commvault-web-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gladinet-centrestack</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/reviewdog-action-setup-github-action</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/acronis-cyber-infrastructure-aci</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nakivo-backup-and-replication</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/edimax-ic-7100-ip-camera</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tj-actions-changed-files-github-action</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-esxi-workstation-and-fusion</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-esxi-and-workstation</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-small-business-rv-series-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-partner-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-power-pages</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mitel-sip-phones</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trimble-cityworks</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sophos-xg-firewall</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sophos-cyberoamos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/audinate-dante-discovery</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/7-zip-7-zip</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jquery-jquery</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/aviatrix-controllers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/acclaim-systems-usaherds</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/reolink-rlc-410w-ip-camera</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/reolink-multiple-ip-cameras</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nuuo-nvrmini2-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nuuo-nvrmini-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/projectsend-projectsend</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/north-grid-proself</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/array-networks-agvxag-arrayos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-kemp-loadmaster</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/metabase-metabase</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nostromo-nhttpd</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sciencelogic-sl1</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sap-commerce-cloud</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/draytek-multiple-vigor-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-adf-faces</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-hugegraph-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/imagemagick-imagemagick</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-publisher</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kingsoft-wps-office</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/versa-director</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jenkins-jenkins-command-line-interface-cli</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/twilio-authy</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/owncloud-owncloud-graphapi</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/solarwinds-serv-u</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rejetto-http-file-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-nx-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/osgeo-jai-ext</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-telerik-report-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/php-group-php</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/check-point-quantum-security-gateways</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/justice-av-solutions-viewer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-flink</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nextgen-healthcare-mirth-connect</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-smartscreen-prompt</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gitlab-gitlab-ceee</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nice-linear-emerge-e3-series</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sunhillo-sureline</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/laravel-laravel-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/joomla-joomla</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-superset</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/spreadsheetparseexcel-spreadsheetparseexcel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fxc-ae1021-ae1021pe</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-viostor-nvr</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/unitronics-vision-plc-and-hmi</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gnu-gnu-c-library</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sophos-web-appliance</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sysaid-sysaid-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ietf-service-location-protocol-slp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-wordpad</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-wsftp-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-libvpx</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-jboss-richfaces-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-one-and-worry-free-business-security</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/realtek-sdk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/laravel-ignition</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-adaptive-security-appliance-and-firepower-threat-defense</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-rocketmq</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ignite-realtime-openfire</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/solarview-compact</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netwrix-auditor</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-tools</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-aria-operations-for-networks</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mozilla-firefox-firefox-esr-and-thunderbird</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/barracuda-networks-email-security-gateway-esg-appliance</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ruckus-wireless-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jenkins-jenkins-user-interface-ui</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-java-se-and-jrockit</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-log4j2</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/papercut-mfng</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-skia</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/novi-survey-novi-survey</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/samba-samba</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-network-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/xstream-xstream</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/plex-media-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-spark</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/teclib-glpi</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zk-framework-auuploader</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ibm-aspera-faspex</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cacti-cacti</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/intel-ethernet-diagnostics-driver-for-windows</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/terramaster-terramaster-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sugarcrm-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-gpu</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-bitbucket-server-and-data-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-one-and-apex-one-as-a-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/code-aurora-acdb-audio-driver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/android-android-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dotcms-dotcms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-couchdb</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-apisix</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-tanzu-spring-cloud</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/webrtc-webrtc</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/delta-electronics-dopsoft-2</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sap-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-intents</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rarlab-unrar</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-confluence</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-popupblocker</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-qts</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-rv-series-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-acrobat-and-reader-flash-player</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-confluence-serverdata-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-solaris</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-input-method-editor-ime-japanese</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ibm-infosphere-biginsights</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/artifex-ghostscript</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-update-notification-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chrome-blink</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chrome-webaudio</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/webkitgtk-webkitgtk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-spring-cloud-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openssl-openssl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wso2-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jenkins-script-security-plugin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/crestron-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trihedral-vtscada-formerly-vts</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/indusoft-web-studio</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ubiquiti-airos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/alcatel-omnipcx-enterprise</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-workspace-one-access-and-identity-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-blazeds</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/checkbox-checkbox-survey</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/watchguard-firebox-and-xtm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-qnap-network-attached-storage-nas</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-smbv1-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-spring-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-central</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dell-dbutil-driver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/redis-debian-specific-redis-servers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-confluence-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-ancillary-function-driver-afdsys</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/watchguard-firebox-and-xtm-appliances</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mitel-micollab-mivoice-business-express</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sitecore-xp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openbsd-opensmtpd</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-tanzu-spring-cloud-configuration-config-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sophos-sg-utm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-systems-helpdesk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-kylin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-bi-publisher-formerly-xml-publisher</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/webmin-webmin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/php-fastcgi-process-manager-fpm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kentico-xperience</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jenkins-matrix-project-plugin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-sd-wan-edge</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/lg-n1a1-nas</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-tanzu-spring-data-commons</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/quest-kace-system-management-appliance</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-secure-access-control-system-acs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-vpn-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/arcserve-unified-data-protection-udp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-prime-data-center-network-manager-dcnm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-kerberos-key-distribution-center-kdc</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rejetto-http-file-server-hfs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hewlett-packard-hp-procurve-manager-pcm-pcm-identity-driven-manager-idm-and-application-lifecycle-management</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-struts</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/php-php</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/phpmyadmin-phpmyadmin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hewlett-packard-hp-openview-network-node-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-vcenter-server-and-cloud-foundation</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hikvision-security-cameras-web-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chrome-media</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/treck-tcpip-stack-ipv6</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/exim-exim-internet-mailer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-small-business-rv320-and-rv325-dual-gigabit-wan-vpn-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/chakracore-chakracore-scripting-engine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-4500-series-switches-and-cisco-catalyst-4500-x-series-switches</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-malware-protection-engine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-6800-series-switches</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/siemens-simatic-cp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-atm-font-driver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-reader</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-java-se-jdk-and-jre</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-forefront-threat-management-gateway-tmg</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-virtualbox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/synacor-zimbra-collaborate-suite-zcs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-animation</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/phpunit-phpunit</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-graphics-component</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-smbv3</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jenkins-jenkins-stapler-web-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-struts-1</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-httpsys</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/intel-active-management-technology-amt-small-business-technology-sbt-and-standard-manageability</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-cross-site-scripting-vulnerability-cve-2026-42897</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-controller-authentication-bypass-vulnerability-cve-2026-20182</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2025-cumulative-update-kb5082126-may-2026</loc>
<lastmod>2026-05-10T13:54:41.350121+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/berriai-litellm-sql-injection-vulnerability-cve-2026-42208</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/third-party-runtime-outdated-dependencies-general</loc>
<lastmod>2026-05-07T12:11:44.581701+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-backup-agent-outdated-general</loc>
<lastmod>2026-05-07T12:11:44.488414+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-click-to-run-missing-update-general</loc>
<lastmod>2026-05-07T12:11:44.399908+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-openssh-outdated-general</loc>
<lastmod>2026-05-07T12:11:44.30896+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-iis-missing-security-patch-general</loc>
<lastmod>2026-05-07T12:11:44.218776+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-end-of-support-2012-general</loc>
<lastmod>2026-05-07T12:11:44.120858+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2016-missing-cumulative-update-kb5055521-april-2026</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-missing-cumulative-update-kb5055519-april-2026</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-windows-defender-enabled-hardening</loc>
<lastmod>2026-05-07T12:11:43.851828+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-remote-registry-disabled-hardening</loc>
<lastmod>2026-05-07T12:11:43.762407+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-guest-account-disabled-hardening</loc>
<lastmod>2026-05-07T12:11:43.670067+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-smb-signing-required-hardening</loc>
<lastmod>2026-05-07T12:11:43.577103+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-powershell-script-block-logging-enabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.834316+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-rdp-nla-enforced-hardening</loc>
<lastmod>2026-05-07T20:52:19.729438+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-smbv1-protocol-disabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.61631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-ntlmv1-protocol-disabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.383431+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-lsass-protection-enabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.045355+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/putty-rsa-nonce-bias-cve-2024-31497</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openssl-infinite-loop-cve-2022-0778</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/curl-heap-buffer-overflow-cve-2023-38545</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-integer-overflow-cve-2023-6345</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-out-of-bounds-memory-cve-2024-0519</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-type-confusion-cve-2023-7024</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-printnightmare-cve-2021-34527</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-proxylogon-cve-2021-26855</loc>
<lastmod>2026-05-16T03:06:36.277155+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-netlogon-zerologon-cve-2020-1472</loc>
<lastmod>2026-05-16T03:04:17.543181+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-log4j-remote-code-execution-cve-2021-44228</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-improper-input-validation-vulnerability-cve-2026-6973</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-pan-os-out-of-bounds-write-vulnerability-cve-2026-0300</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-wdigest-authentication-disabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.273224+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sql-server-missing-security-update-general</loc>
<lastmod>2026-05-03T00:25:23.345765+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-missing-cumulative-update-kb5055526-april-2026</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-buffer-overflow-cve-2023-4863</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sqlite-heap-buffer-overflow-cve-2024-0232</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/webpros-cpanel-whm-and-wp2-wordpress-squared-missing-authentication-for-critical-function-vulnerabil-cve-2026-41940</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-incorrect-resource-transfer-between-spheres-vulnerability-cve-2026-31431</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-defender-insufficient-granularity-of-access-control-vulnerability-cve-2026-33825</loc>
<lastmod>2026-05-16T03:08:15.586254+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-protection-mechanism-failure-vulnerability-cve-2026-32202</loc>
<lastmod>2026-05-16T03:08:13.210635+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-server-improper-input-validation-vulnerability-cve-2026-32201</loc>
<lastmod>2026-05-16T03:08:13.649865+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-prototype-pollution-vulnerability-cve-2026-34621</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/marimo-remote-code-execution-vulnerability-cve-2026-39987</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-activemq-improper-input-validation-vulnerability-cve-2026-34197</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-forticlient-ems-improper-access-control-vulnerability-cve-2026-35616</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-dawn-use-after-free-vulnerability-cve-2026-5281</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trueconf-client-download-of-code-without-integrity-check-vulnerability-cve-2026-3502</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-netscaler-out-of-bounds-read-vulnerability-cve-2026-3055</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/aquasecurity-trivy-embedded-malicious-code-vulnerability-cve-2026-33634</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/langflow-code-injection-vulnerability-cve-2026-33017</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-vulnerabi-cve-2026-3910</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-skia-out-of-bounds-write-vulnerability-cve-2026-3909</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-secure-firewall-management-center-fmc-software-and-cisco-security-cloud-control-scc-firewall-m-cve-2026-20131</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-memory-corruption-vulnerability-cve-2026-21385</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-controller-and-manager-authentication-bypass-vulnerability-cve-2026-20127</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/broadcom-vmware-aria-operations-command-injection-vulnerability-cve-2026-22719</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-manager-incorrect-use-of-privileged-apis-vulnerability-cve-2026-20122</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-manager-exposure-of-sensitive-information-to-an-unauthorized-actor-vulnerabili-cve-2026-20133</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-manager-storing-passwords-in-a-recoverable-format-vulnerability-cve-2026-20128</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dell-recoverpoint-for-virtual-machines-rp4vms-use-of-hard-coded-credentials-vulnerability-cve-2026-22769</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-css-use-after-free-vulnerability-cve-2026-2441</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/soliton-systems-kk-filezen-os-command-injection-vulnerability-cve-2026-25108</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-buffer-overflow-vulnerability-cve-2026-20700</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-epm-authentication-bypass-vulnerability-cve-2026-1603</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-mshtml-framework-protection-mechanism-failure-vulnerability-cve-2026-21513</loc>
<lastmod>2026-05-16T03:06:31.657628+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-null-pointer-dereference-vulnerability-cve-2026-21525</loc>
<lastmod>2026-05-16T03:08:17.111922+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-word-reliance-on-untrusted-inputs-in-a-security-decision-vulnerability-cve-2026-21514</loc>
<lastmod>2026-05-16T03:08:17.616677+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-shell-protection-mechanism-failure-vulnerability-cve-2026-21510</loc>
<lastmod>2026-05-16T03:06:32.147437+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-improper-privilege-management-vulnerability-cve-2026-21533</loc>
<lastmod>2026-05-16T03:06:32.659091+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-type-confusion-vulnerability-cve-2026-21519</loc>
<lastmod>2026-05-16T03:06:33.145388+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/beyondtrust-remote-support-rs-and-privileged-remote-access-pra-os-command-injection-vulnerability-cve-2026-1731</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-forticlient-ems-sql-injection-vulnerability-cve-2026-21643</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/notepad-download-of-code-without-integrity-check-vulnerability-cve-2025-15556</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-code-injection-vulnerability-cve-2026-1281</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-code-injection-vulnerability-cve-2026-1340</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability-cve-2025-40551</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-security-control-bypass-vulnerability-cve-2025-40536</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-multiple-products-authentication-bypass-using-an-alternate-path-or-channel-vulnerability-cve-2026-24858</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-security-feature-bypass-vulnerability-cve-2026-21509</loc>
<lastmod>2026-05-16T03:08:18.638013+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/smartertools-smartermail-missing-authentication-for-critical-function-vulnerability-cve-2026-24423</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/smartertools-smartermail-authentication-bypass-using-an-alternate-path-or-channel-vulnerability-cve-2026-23760</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-unified-communications-products-code-injection-vulnerability-cve-2026-20045</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gnu-inetutils-argument-injection-vulnerability-cve-2026-24061</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-information-disclosure-vulnerability-cve-2026-20805</loc>
<lastmod>2026-05-16T03:08:18.110456+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-deserialization-of-untrusted-data-vulnerability-cve-2026-20963</loc>
<lastmod>2026-05-16T03:08:15.155945+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-vulnerability-cve-2025-66376</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/smartertools-smartermail-unrestricted-upload-of-file-with-dangerous-type-vulnerability-cve-2025-52691</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-php-remote-file-inclusion-vulnerability-cve-2025-68645</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/n8n-improper-control-of-dynamically-managed-code-resources-vulnerability-cve-2025-68613</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/watchguard-firebox-out-of-bounds-write-vulnerability-cve-2025-14733</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mongodb-and-mongodb-server-improper-handling-of-length-parameter-inconsistency-vulnerability-cve-2025-14847</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-vulnerability-cve-2025-68461</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-multiple-products-improper-input-validation-vulnerability-cve-2025-20393</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/hewlett-packard-enterprise-hpe-oneview-code-injection-vulnerability-cve-2025-37164</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-out-of-bounds-memory-access-vulnerability-cve-2025-14174</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-improper-locking-vulnerability-cve-2025-43510</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gladinet-centrestack-and-triofox-hard-coded-cryptographic-vulnerability-cve-2025-14611</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-classic-buffer-overflow-vulnerability-cve-2025-43520</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gogs-path-traversal-vulnerability-cve-2025-8110</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-use-after-free-vulnerability-cve-2025-62221</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-privilege-escalation-vulnerability-cve-2025-48572</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-information-disclosure-vulnerability-cve-2025-48633</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/array-networks-arrayos-ag-os-command-injection-vulnerability-cve-2025-66644</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/meta-react-server-components-remote-code-execution-vulnerability-cve-2025-55182</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/osgeo-geoserver-improper-restriction-of-xml-external-entity-reference-vulnerability-cve-2025-58360</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2025-13223</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-race-condition-vulnerability-cve-2025-62215</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-link-following-vulnerability-cve-2025-60710</loc>
<lastmod>2026-05-16T03:08:16.07683+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gladinet-triofox-improper-access-control-vulnerability-cve-2025-12480</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sangoma-freepbx-os-command-injection-vulnerability-cve-2025-64328</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-use-after-free-vulnerability-cve-2023-43000</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/react-native-community-cli-os-command-injection-vulnerability-cve-2025-11953</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-fusion-middleware-missing-authentication-for-critical-function-vulnerability-cve-2025-61757</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/motex-lanscope-endpoint-manager-improper-verification-of-source-of-a-communication-channel-vulnerabi-cve-2025-61932</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/f5-big-ip-stack-based-buffer-overflow-vulnerability-cve-2025-53521</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5044284-october-2025</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-untrusted-pointer-dereference-vulnerability-cve-2025-24990</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-server-update-service-wsus-deserialization-of-untrusted-data-vulnerability-cve-2025-59287</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-improper-access-control-vulnerability-cve-2025-59230</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-e-business-suite-server-side-request-forgery-ssrf-vulnerability-cve-2025-61884</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gladinet-centrestack-and-triofox-files-or-directories-accessible-to-external-parties-vulnerability-cve-2025-11371</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-e-business-suite-unspecified-vulnerability-cve-2025-61882</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/broadcom-vmware-aria-operations-and-vmware-tools-privilege-defined-with-unsafe-actions-vulnerability-cve-2025-41244</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-secure-firewall-adaptive-security-asa-appliance-and-secure-firewall-threat-defense-ftd-missing-cve-2025-20362</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-secure-firewall-adaptive-security-appliance-asa-and-secure-firewall-threat-defense-ftd-buffer--cve-2025-20333</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2025-10585</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability-cve-2025-26399</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cwp-control-web-panel-os-command-injection-vulnerability-cve-2025-48703</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/libraesva-email-security-gateway-command-injection-vulnerability-cve-2025-59689</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortra-goanywhere-mft-deserialization-of-untrusted-data-vulnerability-cve-2025-10035</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/watchguard-firebox-out-of-bounds-write-vulnerability-cve-2025-9242</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-commerce-and-magento-improper-input-validation-vulnerability-cve-2025-54236</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-cumulative-update-kb5043050-september-2025</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-runtime-use-after-free-vulnerability-cve-2025-48543</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sitecore-multiple-products-deserialization-of-untrusted-data-vulnerability-cve-2025-53690</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/meta-platforms-whatsapp-incorrect-authorization-vulnerability-cve-2025-55177</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sangoma-freepbx-authentication-bypass-vulnerability-cve-2025-57819</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/n-able-n-central-command-injection-vulnerability-cve-2025-8876</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/n-able-n-central-insecure-deserialization-vulnerability-cve-2025-8875</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2016-cumulative-update-kb5041160-august-2025</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rarlab-winrar-path-traversal-vulnerability-cve-2025-8088</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-experience-manager-forms-code-execution-vulnerability-cve-2025-54253</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-one-os-command-injection-vulnerability-cve-2025-54948</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dassault-systmes-delmia-apriso-code-injection-vulnerability-cve-2025-6204</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dassault-systmes-delmia-apriso-missing-authorization-vulnerability-cve-2025-6205</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-buffer-overflow-vulnerability-cve-2025-31277</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-deserialization-of-untrusted-data-vulnerability-cve-2025-53770</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/prettier-eslint-config-prettier-embedded-malicious-code-vulnerability-cve-2025-54313</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/crushftp-unprotected-alternate-channel-vulnerability-cve-2025-54309</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/laravel-livewire-code-injection-vulnerability-cve-2025-54068</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-identity-services-engine-injection-vulnerability-cve-2025-20337</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-angle-and-gpu-improper-input-validation-vulnerability-cve-2025-6558</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wing-ftp-server-improper-neutralization-of-null-byte-or-nul-character-vulnerability-cve-2025-47812</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wing-ftp-server-information-disclosure-vulnerability-cve-2025-47813</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/git-link-following-vulnerability-cve-2025-48384</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-improper-authentication-vulnerability-cve-2025-49706</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-code-injection-vulnerability-cve-2025-49704</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sudo-inclusion-of-functionality-from-untrusted-control-sphere-vulnerability-cve-2025-32463</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2025-6554</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-identity-services-engine-injection-vulnerability-cve-2025-20281</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/quest-kace-systems-management-appliance-sma-improper-authentication-vulnerability-cve-2025-32975</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-vulnerability-cve-2025-48700</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rarlab-winrar-path-traversal-vulnerability-cve-2025-6218</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-external-control-of-file-name-or-path-vulnerability-cve-2025-33053</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smb-client-improper-access-control-vulnerability-cve-2025-33073</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/igel-os-use-of-a-key-past-its-expiration-date-vulnerability-cve-2025-47827</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-out-of-bounds-read-and-write-vulnerability-cve-2025-5419</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-deserialization-of-untrusted-data-vulnerability-cve-2025-49113</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dassault-systmes-delmia-apriso-deserialization-of-untrusted-data-vulnerability-cve-2025-5086</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/telemessage-tm-sgnl-exposure-of-core-dump-file-to-an-unauthorized-control-sphere-vulnerability-cve-2025-48928</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/telemessage-tm-sgnl-initialization-of-a-resource-with-an-insecure-default-vulnerability-cve-2025-48927</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/smartbedded-meteobridge-command-injection-vulnerability-cve-2025-4008</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/versa-concerto-improper-authentication-vulnerability-cve-2025-34026</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/remote-desktop-gateway-heap-overflow-cve-2025-29967-may-2025</loc>
<lastmod>2026-05-15T23:55:01.598535+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/defender-for-identity-spoofing-cve-2025-26685-may-2025</loc>
<lastmod>2026-05-15T23:56:29.902315+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2025-cumulative-update-kb5058411-may-2025</loc>
<lastmod>2026-05-15T23:55:01.097831+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-cumulative-update-kb5058392-may-2025</loc>
<lastmod>2026-05-15T23:55:00.996087+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-remote-desktop-heap-overflow-cve-2025-29966-may-2025</loc>
<lastmod>2026-05-15T23:55:01.502663+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5058385-may-2025</loc>
<lastmod>2026-05-15T23:55:00.861213+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-netweaver-deserialization-vulnerability-cve-2025-42999</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-scripting-engine-memory-corruption-cve-2025-30397-may-2025</loc>
<lastmod>2026-05-16T03:04:13.934492+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-dwm-core-eop-cve-2025-30400-may-2025</loc>
<lastmod>2026-05-16T03:06:40.946768+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-clfs-driver-eop-cve-2025-32701-may-2025</loc>
<lastmod>2026-05-16T03:06:37.786241+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/telemessage-tm-sgnl-hidden-functionality-vulnerability-cve-2025-47729</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sysaid-on-prem-improper-restriction-of-xml-external-entity-reference-vulnerability-cve-2025-2776</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sysaid-on-prem-improper-restriction-of-xml-external-entity-reference-vulnerability-cve-2025-2775</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/craft-cms-external-control-of-assumed-immutable-web-parameter-vulnerability-cve-2025-35939</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/srimax-output-messenger-directory-traversal-vulnerability-cve-2025-27920</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/craft-cms-code-injection-vulnerability-cve-2025-32432</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/commvault-web-server-unspecified-vulnerability-cve-2025-3928</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/connectwise-screenconnect-improper-authentication-vulnerability-cve-2025-3935</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-netweaver-unrestricted-file-upload-vulnerability-cve-2025-31324</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/broadcom-brocade-fabric-os-code-injection-vulnerability-cve-2025-1976</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/commvault-command-center-path-traversal-vulnerability-cve-2025-34028</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualitia-active-mail-stack-based-buffer-overflow-vulnerability-cve-2025-42599</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/erlang-erlangotp-ssh-server-missing-authentication-for-critical-function-vulnerability-cve-2025-32433</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/yiiframework-yii-improper-protection-of-alternate-path-vulnerability-cve-2024-58136</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-use-after-free-vulnerability-cve-2025-29824</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/langflow-missing-authentication-vulnerability-cve-2025-3248</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gladinet-centrestack-and-triofox-use-of-hard-coded-cryptographic-key-vulnerability-cve-2025-30406</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/crushftp-authentication-bypass-vulnerability-cve-2025-31161</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vite-vitejs-improper-access-control-vulnerability-cve-2025-31125</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-mojo-sandbox-escape-vulnerability-cve-2025-2783</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dir-823x-command-injection-vulnerability-cve-2025-29635</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kentico-xperience-path-traversal-vulnerability-cve-2025-2749</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kentico-xperience-cms-authentication-bypass-using-an-alternate-path-or-channel-vulnerability-cve-2025-2747</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kentico-xperience-cms-authentication-bypass-using-an-alternate-path-or-channel-vulnerability-cve-2025-2746</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/reviewdogaction-setup-github-action-embedded-malicious-code-vulnerability-cve-2025-30154</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tj-actionschanged-files-github-action-embedded-malicious-code-vulnerability-cve-2025-30066</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-vulnerability-cve-2025-27915</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-win32k-use-after-free-vulnerability-cve-2025-24983</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-fast-fat-file-system-driver-integer-overflow-vulnerability-cve-2025-24985</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-management-console-mmc-improper-neutralization-vulnerability-cve-2025-26633</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntfs-information-disclosure-vulnerability-cve-2025-24984</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntfs-out-of-bounds-read-vulnerability-cve-2025-24991</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntfs-heap-based-buffer-overflow-vulnerability-cve-2025-24993</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntlm-hash-disclosure-spoofing-vulnerability-cve-2025-24054</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/freetype-out-of-bounds-write-vulnerability-cve-2025-27363</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ami-megarac-spx-authentication-bypass-by-spoofing-vulnerability-cve-2024-54085</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-tomcat-path-equivalence-vulnerability-cve-2025-24813</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/edimax-ic-7100-ip-camera-os-command-injection-vulnerability-cve-2025-1316</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-arbitrary-write-vulnerability-cve-2025-22225</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-and-workstation-toctou-race-condition-vulnerability-cve-2025-22224</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nakivo-backup-and-replication-absolute-path-traversal-vulnerability-cve-2024-48248</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-workstation-and-fusion-information-disclosure-vulnerability-cve-2025-22226</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/xwiki-platform-eval-injection-vulnerability-cve-2025-24893</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-power-pages-improper-access-control-vulnerability-cve-2025-24989</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-storage-link-following-vulnerability-cve-2025-21391</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ancillary-function-driver-for-winsock-heap-based-buffer-overflow-vulnerability-cve-2025-21418</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wazuh-server-deserialization-of-untrusted-data-vulnerability-cve-2025-24016</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trimble-cityworks-deserialization-vulnerability-cve-2025-0994</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/advantive-veracore-sql-injection-vulnerability-cve-2025-25181</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/advantive-veracore-unrestricted-file-upload-vulnerability-cve-2024-57968</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/digiever-ds-2105-pro-missing-authorization-vulnerability-cve-2023-52163</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/7-zip-mark-of-the-web-bypass-vulnerability-cve-2025-0411</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/craft-cms-code-injection-vulnerability-cve-2025-23209</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/simplehelp-path-traversal-vulnerability-cve-2024-57727</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/simplehelp-path-traversal-vulnerability-cve-2024-57728</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/simplehelp-missing-authorization-vulnerability-cve-2024-57726</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-hyper-v-nt-kernel-integration-vsp-heap-based-buffer-overflow-vulnerability-cve-2025-21333</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-hyper-v-nt-kernel-integration-vsp-use-after-free-vulnerability-cve-2025-21335</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-hyper-v-nt-kernel-integration-vsp-use-after-free-vulnerability-cve-2025-21334</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-ole-rce-cve-2025-21298-january-2025</loc>
<lastmod>2026-05-16T13:16:57.083582+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/aviatrix-controllers-os-command-injection-vulnerability-cve-2024-50603</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/draytek-vigor-routers-os-command-injection-vulnerability-cve-2024-12987</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/beyondtrust-privileged-remote-access-pra-and-remote-support-rs-os-command-injection-vulnerability-cve-2024-12686</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/craft-cms-code-injection-vulnerability-cve-2024-56145</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/beyondtrust-privileged-remote-access-pra-and-remote-support-rs-command-injection-vulnerability-cve-2024-12356</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cleo-multiple-products-unauthenticated-file-upload-vulnerability-cve-2024-55956</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-heap-based-buffer-overflow-vulnerability-cve-2024-49138</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-micollab-path-traversal-vulnerability-cve-2024-55550</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-ldap-rce-cve-2024-49112-december-2024</loc>
<lastmod>2026-05-16T13:16:57.22883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-partner-center-improper-access-control-vulnerability-cve-2024-49035</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/projectsend-improper-authentication-vulnerability-cve-2024-11680</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-agile-product-lifecycle-management-plm-incorrect-authorization-vulnerability-cve-2024-21287</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/geovision-devices-os-command-injection-vulnerability-cve-2024-11120</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mdaemon-email-server-cross-site-scripting-xss-vulnerability-cve-2024-11182</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-privilege-escalation-vulnerability-cve-2024-43093</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-nt-kernel-eop-cve-2024-43623-november-2024</loc>
<lastmod>2026-05-16T13:16:57.363103+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntlmv2-hash-disclosure-spoofing-vulnerability-cve-2024-43451</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-task-scheduler-privilege-escalation-vulnerability-cve-2024-49039</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-adcs-eop-cve-2024-49019-november-2024</loc>
<lastmod>2026-05-16T13:16:57.492604+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cyberpanel-incorrect-default-permissions-vulnerability-cve-2024-51567</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cyberpanel-incorrect-default-permissions-vulnerability-cve-2024-51378</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cleo-multiple-products-unrestricted-file-upload-vulnerability-cve-2024-50623</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-denial-of-service-vulnerability-cve-2024-20481</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-micollab-path-traversal-vulnerability-cve-2024-41713</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sciencelogic-sl1-unspecified-vulnerability-cve-2024-9537</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/firefox-use-after-free-rce-cve-2024-9680-october-2024</loc>
<lastmod>2026-05-13T01:12:15.109334+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-spoofing-vulnerability-cve-2024-43573</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-management-console-remote-code-execution-vulnerability-cve-2024-43572</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-configuration-manager-sql-injection-vulnerability-cve-2024-43468</loc>
<lastmod>2026-05-16T03:08:16.58717+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-command-execution-vulnerability-cve-2024-45519</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ptzoptics-pt30x-sdindi-cameras-os-command-injection-vulnerability-cve-2024-8957</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ptzoptics-pt30x-sdindi-cameras-authentication-bypass-vulnerability-cve-2024-8956</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-heap-based-buffer-overflow-vulnerability-cve-2024-38812</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-privilege-escalation-vulnerability-cve-2024-38813</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-publisher-protection-mechanism-failure-vulnerability-cve-2024-38226</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-installer-improper-privilege-management-vulnerability-cve-2024-38014</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-spoofing-vulnerability-cve-2024-43461</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mark-of-the-web-motw-protection-mechanism-failure-vulnerability-cve-2024-38217</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veeam-backup-unauthenticated-rce-cve-2024-40711-september-2024</loc>
<lastmod>2026-05-13T01:12:16.094679+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-ofbiz-forced-browsing-vulnerability-cve-2024-45195</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-smart-licensing-utility-static-credential-vulnerability-cve-2024-20439</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-whatsup-gold-sql-injection-vulnerability-cve-2024-6670</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/teamviewer-driver-privilege-escalation-cve-2024-7479-august-2024</loc>
<lastmod>2026-05-13T01:12:16.767291+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/versa-director-dangerous-file-type-upload-vulnerability-cve-2024-39717</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2024-7971</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-inappropriate-implementation-vulnerability-cve-2024-7965</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-hardcoded-credential-vulnerability-cve-2024-28987</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kingsoft-wps-office-path-traversal-vulnerability-cve-2024-7262</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-power-dependency-coordinator-privilege-escalation-vulnerability-cve-2024-38107</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2024-38106</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ancillary-function-driver-for-winsock-privilege-escalation-vulnerability-cve-2024-38193</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability-cve-2024-28986</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-scripting-engine-memory-corruption-vulnerability-cve-2024-38178</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-tcpip-ipv6-rce-cve-2024-38063-august-2024</loc>
<lastmod>2026-05-16T13:16:56.920898+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-project-remote-code-execution-vulnerability-cve-2024-38189</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smartscreen-security-feature-bypass-vulnerability-cve-2024-38213</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability-cve-2024-27443</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/teamt5-threatsonar-anti-ransomware-unrestricted-upload-of-file-with-dangerous-type-vulnerability-cve-2024-7694</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-magicinfo-9-server-path-traversal-vulnerability-cve-2024-7399</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-sip-phones-argument-injection-vulnerability-cve-2024-41710</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-update-stack-downdate-cve-2024-38202-october-2024</loc>
<lastmod>2026-05-16T13:16:57.627093+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-vulnerability-cve-2024-42009</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-ofbiz-incorrect-authorization-vulnerability-cve-2024-38856</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/acronis-cyber-infrastructure-aci-insecure-default-password-vulnerability-cve-2023-45249</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/servicenow-improper-input-validation-vulnerability-cve-2024-4879</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/servicenow-incomplete-list-of-disallowed-inputs-vulnerability-cve-2024-5217</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-rdls-rce-cve-2024-38077-july-2024</loc>
<lastmod>2026-05-16T13:16:56.121432+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-deserialization-vulnerability-cve-2024-38094</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-spoofing-vulnerability-cve-2024-38112</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-2022-cumulative-update-kb5040442-july-2024</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-hyper-v-privilege-escalation-vulnerability-cve-2024-38080</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/twilio-authy-information-disclosure-vulnerability-cve-2024-39891</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-nx-os-command-injection-vulnerability-cve-2024-20399</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/osgeo-geoserver-geotools-eval-injection-vulnerability-cve-2024-36401</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openssh-unauthenticated-rce-cve-2024-6387-july-2024</loc>
<lastmod>2026-05-13T01:12:15.7694+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-improper-escaping-of-output-vulnerability-cve-2024-38475</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-authentication-bypass-vulnerability-cve-2024-37085</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-whatsup-gold-path-traversal-vulnerability-cve-2024-4885</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/broadcom-vmware-vcenter-server-out-of-bounds-write-vulnerability-cve-2024-37079</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/geovision-devices-os-command-injection-vulnerability-cve-2024-6047</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-pixel-privilege-escalation-vulnerability-cve-2024-32896</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-commerce-and-magento-open-source-improper-restriction-of-xml-external-entity-reference-xxe-vul-cve-2024-34102</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-mode-driver-untrusted-pointer-dereference-vulnerability-cve-2024-35250</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-msmq-rce-cve-2024-30080-june-2024</loc>
<lastmod>2026-05-16T13:16:56.749368+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-toctou-race-condition-vulnerability-cve-2024-30088</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/php-cgi-os-command-injection-vulnerability-cve-2024-4577</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-xss-vulnerability-cve-2024-37383</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-serv-u-path-traversal-vulnerability-cve-2024-28995</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rejetto-http-file-server-improper-neutralization-of-special-elements-used-in-a-template-engine-vulne-cve-2024-23692</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-telerik-report-server-authentication-bypass-by-spoofing-vulnerability-cve-2024-4358</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2024-5274</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/check-point-quantum-security-gateways-information-disclosure-vulnerability-cve-2024-24919</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/justice-av-solutions-javs-viewer-installer-embedded-malicious-code-vulnerability-cve-2024-4978</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2024-4947</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/git-clone-rce-windows-cve-2024-32002-may-2024</loc>
<lastmod>2026-05-13T01:12:16.203241+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-security-feature-bypass-vulnerability-cve-2024-30040</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-out-of-bounds-memory-write-vulnerability-cve-2024-4761</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-dwm-core-library-privilege-escalation-vulnerability-cve-2024-30051</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/edge-chromium-use-after-free-cve-2024-4671-may-2024</loc>
<lastmod>2026-05-16T03:06:38.926984+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-ofbiz-path-traversal-vulnerability-cve-2024-32113</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-denial-of-service-vulnerability-cve-2024-20353</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-privilege-escalation-vulnerability-cve-2024-20359</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-hugegraph-server-improper-access-control-vulnerability-cve-2024-27348</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/crushftp-vfs-sandbox-escape-vulnerability-cve-2024-4040</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/java-jdk-dos-cve-2024-21011-april-2024</loc>
<lastmod>2026-05-13T01:12:15.439901+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/winscp-sftp-client-security-update-6-3-3</loc>
<lastmod>2026-05-13T01:12:17.302582+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/putty-private-key-recovery-cve-2024-31497-april-2024</loc>
<lastmod>2026-05-13T01:12:16.97897+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-globalprotect-rce-cve-2024-3400-april-2024</loc>
<lastmod>2026-05-15T23:21:50.171066+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nodejs-cmd-injection-cve-2024-27980-april-2024</loc>
<lastmod>2026-05-13T01:12:15.984689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5036896-april-2024</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-smartscreen-prompt-security-feature-bypass-vulnerability-cve-2024-29988</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-csc-service-eop-cve-2024-26229-april-2024</loc>
<lastmod>2026-05-16T13:16:57.783773+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-pixel-information-disclosure-vulnerability-cve-2024-29745</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-pixel-privilege-escalation-vulnerability-cve-2024-29748</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-net-framework-information-disclosure-vulnerability-cve-2024-29059</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/firefox-out-of-bounds-rce-cve-2024-29943-march-2024</loc>
<lastmod>2026-05-13T01:12:15.220511+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/python-zipimport-path-traversal-cve-2024-0450-march-2024</loc>
<lastmod>2026-05-13T01:12:15.660512+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-improper-access-control-vulnerability-cve-2024-20767</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-tomcat-http2-dos-cve-2024-24549-march-2024</loc>
<lastmod>2026-05-13T01:12:15.87971+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-error-reporting-service-improper-privilege-management-vulnerability-cve-2024-26169</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jetbrains-teamcity-relative-path-traversal-vulnerability-cve-2024-27199</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jetbrains-teamcity-authentication-bypass-vulnerability-cve-2024-27198</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-kemp-loadmaster-os-command-injection-vulnerability-cve-2024-1212</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/connectwise-screenconnect-authentication-bypass-vulnerability-cve-2024-1709</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/connectwise-screenconnect-path-traversal-vulnerability-cve-2024-1708</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-agile-product-lifecycle-management-plm-deserialization-vulnerability-cve-2024-20953</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-privilege-escalation-vulnerability-cve-2024-21410</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smartscreen-security-feature-bypass-vulnerability-cve-2024-21351</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-outlook-improper-input-validation-vulnerability-cve-2024-21413</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoom-desktop-improper-input-rce-cve-2024-24691-february-2024</loc>
<lastmod>2026-05-13T01:12:16.649075+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-internet-shortcut-files-security-feature-bypass-vulnerability-cve-2024-21412</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-exposed-ioctl-with-insufficient-access-control-vulnerability-cve-2024-21338</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortios-out-of-bounds-write-cve-2024-21762-february-2024</loc>
<lastmod>2026-05-15T23:22:12.797353+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jenkins-command-line-interface-cli-path-traversal-vulnerability-cve-2024-23897</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-data-center-and-server-template-injection-vulnerability-cve-2023-22527</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gitlab-community-and-enterprise-editions-improper-access-control-vulnerability-cve-2023-7028</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-connect-secure-rce-cve-2024-21887-january-2024</loc>
<lastmod>2026-05-15T23:22:42.47434+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-and-ipados-use-after-free-vulnerability-cve-2023-41974</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5034441-january-2024</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/spreadsheetparseexcel-remote-code-execution-vulnerability-cve-2023-7101</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-viostor-nvr-os-command-injection-vulnerability-cve-2023-47565</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fxc-ae1021-ae1021pe-os-command-injection-vulnerability-cve-2023-49897</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/unitronics-vision-plc-and-hmi-insecure-default-password-vulnerability-cve-2023-6448</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/owncloud-graphapi-information-disclosure-vulnerability-cve-2023-49103</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qlik-sense-http-tunneling-vulnerability-cve-2023-48365</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smartscreen-security-feature-bypass-vulnerability-cve-2023-36025</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-desktop-window-manager-dwm-core-library-privilege-escalation-vulnerability-cve-2023-36033</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-cloud-files-mini-filter-driver-privilege-escalation-vulnerability-cve-2023-36036</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-out-of-bounds-read-vulnerability-cve-2023-36424</loc>
<lastmod>2026-05-16T03:06:30.114431+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sysaid-server-path-traversal-vulnerability-cve-2023-47246</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-data-center-and-server-improper-authorization-vulnerability-cve-2023-22518</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-activemq-deserialization-of-untrusted-data-vulnerability-cve-2023-46604</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/f5-bigip-auth-bypass-rce-cve-2023-46747-october-2023</loc>
<lastmod>2026-05-13T01:12:17.193706+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nextgen-healthcare-mirth-connect-deserialization-of-untrusted-data-vulnerability-cve-2023-43208</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-out-of-bounds-write-vulnerability-cve-2023-34048</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-ios-xe-webui-command-injection-cve-2023-20273-october-2023</loc>
<lastmod>2026-05-13T01:12:17.086465+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-persistent-cross-site-scripting-xss-vulnerability-cve-2023-5631</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/north-grid-proself-improper-restriction-of-xml-external-entity-xxe-reference-vulnerability-cve-2023-45727</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/java-tls-dos-cve-2023-22081-october-2023</loc>
<lastmod>2026-05-13T01:12:15.550291+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-ios-xe-privilege-escalation-cve-2023-20198-october-2023</loc>
<lastmod>2026-05-15T23:22:52.544014+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-wordpad-information-disclosure-vulnerability-cve-2023-36563</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-skype-for-business-privilege-escalation-vulnerability-cve-2023-41763</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability-cve-2023-36584</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-data-center-and-server-broken-access-control-vulnerability-cve-2023-22515</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gnu-c-library-buffer-overflow-vulnerability-cve-2023-4911</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-libvpx-heap-buffer-overflow-vulnerability-cve-2023-5217</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-wsftp-server-deserialization-of-untrusted-data-vulnerability-cve-2023-40044</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-persistent-cross-site-scripting-xss-vulnerability-cve-2023-43770</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-one-and-worry-free-business-security-remote-code-execution-vulnerability-cve-2023-41179</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jetbrains-teamcity-authentication-bypass-vulnerability-cve-2023-42793</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-improper-access-control-vulnerability-cve-2023-38205</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-out-of-bounds-write-vulnerability-cve-2023-26369</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-2022-http2-rapid-reset-kb5030214-september-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-streaming-service-proxy-privilege-escalation-vulnerability-cve-2023-36802</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-word-information-disclosure-vulnerability-cve-2023-36761</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-privilege-escalation-vulnerability-cve-2023-35674</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-adaptive-security-appliance-and-firepower-threat-defense-unauthorized-access-vulnerability-cve-2023-20269</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2023-4762</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qlik-sense-path-traversal-vulnerability-cve-2023-41266</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qlik-sense-http-tunneling-vulnerability-cve-2023-41265</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rarlab-winrar-code-execution-vulnerability-cve-2023-38831</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/winrar-out-of-bounds-write-rce-cve-2023-40477-august-2023</loc>
<lastmod>2026-05-13T01:12:16.872938+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-net-core-and-visual-studio-denial-of-service-vulnerability-cve-2023-38180</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zkteco-biotime-path-traversal-vulnerability-cve-2023-38950</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability-cve-2023-37580</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2023-38203</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-adc-gateway-rce-cve-2023-3519-july-2023</loc>
<lastmod>2026-05-15T23:22:23.242653+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-improper-access-control-vulnerability-cve-2023-29298</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2023-29300</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-privilege-escalation-vulnerability-cve-2023-32046</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5028997-july-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-search-remote-code-execution-vulnerability-cve-2023-36884</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-defender-smartscreen-security-feature-bypass-vulnerability-cve-2023-32049</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-outlook-security-feature-bypass-vulnerability-cve-2023-35311</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-error-reporting-service-privilege-escalation-vulnerability-cve-2023-36874</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability-cve-2023-34192</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-pixel-information-disclosure-vulnerability-cve-2023-21237</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/papercut-ngmf-cross-site-request-forgery-csrf-vulnerability-cve-2023-2533</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-streaming-service-untrusted-pointer-dereference-vulnerability-cve-2023-29360</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-server-privilege-escalation-vulnerability-cve-2023-29357</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-tools-authentication-bypass-vulnerability-cve-2023-20867</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortigate-ssl-vpn-heap-overflow-cve-2023-27997-june-2023</loc>
<lastmod>2026-05-15T23:22:01.190457+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-aria-operations-for-networks-command-injection-vulnerability-cve-2023-20887</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2023-3079</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/moveit-transfer-sql-injection-rce-cve-2023-34362-june-2023</loc>
<lastmod>2026-05-13T01:12:16.308473+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ignite-realtime-openfire-path-traversal-vulnerability-cve-2023-32315</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/barracuda-networks-esg-appliance-improper-input-validation-vulnerability-cve-2023-2868</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-rocketmq-command-execution-vulnerability-cve-2023-33246</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2023-29336</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-server-code-injection-vulnerability-cve-2023-24955</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/service-location-protocol-slp-denial-of-service-vulnerability-cve-2023-29552</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-superset-insecure-default-initialization-of-resource-vulnerability-cve-2023-27524</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/papercut-mfng-improper-access-control-vulnerability-cve-2023-27350</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/papercut-ngmf-improper-authentication-vulnerability-cve-2023-27351</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-skia-integer-overflow-vulnerability-cve-2023-2136</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2023-2033</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-command-injection-vulnerability-cve-2023-20118</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/novi-survey-insecure-deserialization-vulnerability-cve-2023-29492</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5025229-april-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-cng-key-isolation-service-privilege-escalation-vulnerability-cve-2023-28229</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability-cve-2023-28252</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sophos-web-appliance-command-injection-vulnerability-cve-2023-1671</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/hitachi-vantara-pentaho-ba-server-authorization-bypass-vulnerability-cve-2022-43939</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/hitachi-vantara-pentaho-ba-server-special-element-injection-vulnerability-cve-2022-43769</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-privilege-escalation-vulnerability-cve-2023-20963</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortra-cobalt-strike-user-interface-remote-code-execution-vulnerability-cve-2022-42948</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2023-26359</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2023-26360</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/minio-information-disclosure-vulnerability-cve-2023-28432</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/minio-security-feature-bypass-vulnerability-cve-2023-28434</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/array-networks-ag-and-vxag-arrayos-missing-authentication-for-critical-function-vulnerability-cve-2023-28461</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/outlook-ntlm-credential-theft-kb5023745-march-2023</loc>
<lastmod>2026-05-16T03:06:35.838816+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smartscreen-security-feature-bypass-vulnerability-cve-2023-24880</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-2022-cumulative-update-kb5023706-march-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veeam-backup-replication-cloud-connect-missing-authentication-for-critical-function-vulnerability-cve-2023-27532</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/webkitgtk-memory-corruption-vulnerability-cve-2019-8720</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ibm-aspera-faspex-code-execution-vulnerability-cve-2022-47986</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/joomla-improper-access-control-vulnerability-cve-2023-23752</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/word-rtf-heap-corruption-rce-cve-2023-21716-february-2023</loc>
<lastmod>2026-05-13T01:12:16.538799+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-publisher-security-feature-bypass-vulnerability-cve-2023-21715</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5022842-february-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability-cve-2023-23376</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-deserialization-of-untrusted-data-vulnerability-cve-2023-21529</loc>
<lastmod>2026-05-16T03:06:29.617905+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-graphic-component-privilege-escalation-vulnerability-cve-2023-21823</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/multiple-ruckus-wireless-products-csrf-and-rce-vulnerability-cve-2023-25717</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/terramaster-os-remote-command-execution-vulnerability-cve-2022-24990</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortra-goanywhere-mft-remote-code-execution-vulnerability-cve-2023-0669</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-multiple-products-remote-code-execution-vulnerability-cve-2022-47966</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-unspecified-vulnerability-cve-2023-21839</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-use-after-free-vulnerability-cve-2023-21608</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/multiple-sugarcrm-products-remote-code-execution-vulnerability-cve-2023-22952</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-advanced-local-procedure-call-alpc-privilege-escalation-vulnerability-cve-2023-21674</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dotnet-framework-elevation-kb5022143-january-2023</loc>
<lastmod>2026-05-13T01:12:14.157509+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cwp-control-web-panel-os-command-injection-vulnerability-cve-2022-44877</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-use-after-free-vulnerability-cve-2022-26485</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-use-after-free-vulnerability-cve-2022-26486</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-defender-smartscreen-security-feature-bypass-vulnerability-cve-2022-44698</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cacti-command-injection-vulnerability-cve-2022-46169</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2022-4262</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-gpu-heap-buffer-overflow-vulnerability-cve-2022-4135</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-mivoice-connect-command-injection-vulnerability-cve-2022-40765</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-mivoice-connect-code-injection-vulnerability-cve-2022-41223</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dante-discovery-process-control-vulnerability-cve-2022-23748</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability-cve-2022-41091</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability-cve-2022-41049</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-privilege-escalation-vulnerability-cve-2022-41073</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-privilege-escalation-vulnerability-cve-2022-41080</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-scripting-languages-remote-code-execution-vulnerability-cve-2022-41128</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-cng-key-isolation-service-privilege-escalation-vulnerability-cve-2022-41125</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/netwrix-auditor-insecure-object-deserialization-vulnerability-cve-2022-31199</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2022-3723</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-e-business-suite-unspecified-vulnerability-cve-2022-21587</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-privilege-escalation-vulnerability-cve-2022-38028</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-com-event-system-service-privilege-escalation-vulnerability-cve-2022-41033</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exchange-server-proxynotshell-rce-kb5019758-october-2022</loc>
<lastmod>2026-05-16T03:04:16.340116+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-sd-wan-path-traversal-vulnerability-cve-2022-20775</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-network-service-use-after-free-vulnerability-cve-2022-3038</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-mojo-insufficient-data-validation-vulnerability-cve-2022-3075</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-arbitrary-file-upload-vulnerability-cve-2022-41352</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-intents-insufficient-input-validation-vulnerability-cve-2022-2856</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortra-cobalt-strike-teamserver-cross-site-scripting-xss-vulnerability-cve-2022-39197</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-one-and-apex-one-as-a-service-improper-validation-vulnerability-cve-2022-40139</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/teclib-glpi-remote-code-execution-vulnerability-cve-2022-35914</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability-cve-2022-37969</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-photo-station-externally-controlled-reference-vulnerability-cve-2022-27593</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zk-framework-auuploader-unspecified-vulnerability-cve-2022-36537</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-bitbucket-server-and-data-center-command-injection-vulnerability-cve-2022-36804</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-authentication-bypass-vulnerability-cve-2022-37042</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-support-diagnostic-tool-msdt-remote-code-execution-vulnerability-cve-2022-34713</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/webrtc-heap-buffer-overflow-vulnerability-cve-2022-2294</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2022-1364</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2022-1096</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-questions-for-confluence-app-hard-coded-credentials-vulnerability-cve-2022-26138</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-multiple-products-remote-code-execution-vulnerability-cve-2022-35405</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-spark-command-injection-vulnerability-cve-2022-33891</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dotcms-unrestricted-upload-of-file-vulnerability-cve-2022-26352</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5015808-july-2022</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-client-server-runtime-subsystem-csrss-privilege-escalation-vulnerability-cve-2022-22047</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/office-msdt-rce-follina-kb5014699-june-2022</loc>
<lastmod>2026-05-16T03:04:18.571985+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-server-and-data-center-remote-code-execution-vulnerability-cve-2022-26134</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarview-compact-command-injection-vulnerability-cve-2022-29303</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-lsa-spoofing-vulnerability-cve-2022-26925</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-active-directory-domain-services-privilege-escalation-vulnerability-cve-2022-26923</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rarlab-unrar-directory-traversal-vulnerability-cve-2022-30333</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-couchdb-insecure-default-initialization-of-resource-vulnerability-cve-2022-24706</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-mivoice-connect-data-validation-vulnerability-cve-2022-29499</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability-cve-2022-27926</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-command-injection-vulnerability-cve-2022-27924</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-arbitrary-file-upload-vulnerability-cve-2022-27925</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-adf-faces-deserialization-of-untrusted-data-vulnerability-cve-2022-21445</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-adselfservice-plus-remote-code-execution-vulnerability-cve-2022-28810</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wso2-multiple-products-unrestrictive-upload-of-file-vulnerability-cve-2022-29464</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-user-profile-service-privilege-escalation-vulnerability-cve-2022-26904</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-clfs-driver-privilege-escalation-vulnerability-cve-2022-24521</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-multiple-products-privilege-escalation-vulnerability-cve-2022-22960</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/osgeo-geoserver-jai-ext-code-injection-vulnerability-cve-2022-24816</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-workspace-one-access-and-identity-manager-server-side-template-injection-vulnerability-cve-2022-22954</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-animation-use-after-free-vulnerability-cve-2022-0609</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/spring-framework-jdk-9-remote-code-execution-vulnerability-cve-2022-22965</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-tanzu-spring-cloud-function-remote-code-execution-vulnerability-cve-2022-22963</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-central-arbitrary-file-upload-vulnerability-cve-2022-26871</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-incorrect-default-file-permissions-vulnerability-cve-2022-22948</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veeam-backup-replication-remote-code-execution-vulnerability-cve-2022-26501</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veeam-backup-replication-remote-code-execution-vulnerability-cve-2022-26500</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openssl-infinite-loop-dos-cve-2022-0778-march-2022</loc>
<lastmod>2026-05-13T01:12:16.424231+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/micollab-mivoice-business-express-access-control-vulnerability-cve-2022-26143</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/watchguard-firebox-and-xtm-appliances-arbitrary-code-execution-cve-2022-26318</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-spring-cloud-gateway-code-injection-vulnerability-cve-2022-22947</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/watchguard-firebox-and-xtm-privilege-escalation-vulnerability-cve-2022-23176</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/debian-specific-redis-server-lua-sandbox-escape-vulnerability-cve-2022-0543</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/red-hat-polkit-incorrect-authorization-vulnerability-cve-2021-3560</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-commerce-and-magento-open-source-improper-input-validation-vulnerability-cve-2022-24086</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-use-after-free-vulnerability-cve-2021-4102</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-apisix-authentication-bypass-vulnerability-cve-2022-24112</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20699</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20701</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20703</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20708</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20700</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaborate-suite-zcs-cross-site-scripting-vulnerability-cve-2022-24682</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-multiple-products-http-request-smuggling-vulnerability-cve-2022-22536</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-privilege-escalation-vulnerability-cve-2022-22718</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-privilege-escalation-vulnerability-cve-2022-21999</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-runtime-remote-code-execution-vulnerability-cve-2022-21971</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/reolink-rlc-410w-ip-camera-os-command-injection-vulnerability-cve-2021-40407</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/red-hat-polkit-out-of-bounds-read-and-write-vulnerability-cve-2021-4034</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-fusion-middleware-unspecified-vulnerability-cve-2021-35587</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nuuo-nvrmini2-devices-missing-authentication-vulnerability-cve-2022-23227</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zabbix-frontend-improper-access-control-vulnerability-cve-2022-23134</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zabbix-frontend-authentication-bypass-vulnerability-cve-2022-23131</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2022-21882</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-user-profile-service-privilege-escalation-vulnerability-cve-2022-21919</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-serv-u-improper-input-validation-vulnerability-cve-2021-35247</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/acclaim-systems-usaherds-use-of-hard-coded-credentials-vulnerability-cve-2021-44207</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/omnissa-workspace-one-server-side-request-forgery-cve-2021-22054</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-privilege-escalation-vulnerability-cve-2021-43226</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-appx-installer-spoofing-vulnerability-cve-2021-43890</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-log4j2-deserialization-of-untrusted-data-vulnerability-cve-2021-45046</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5008212-december-2021</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gitlab-community-and-enterprise-editions-server-side-request-forgery-ssrf-vulnerability-cve-2021-39935</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-desktop-central-authentication-bypass-vulnerability-cve-2021-44515</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fatpipe-warp-ipvpn-and-mpvpn-configuration-upload-exploit-cve-2021-27860</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/grafana-path-traversal-vulnerability-cve-2021-43798</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-servicedesk-plus-remote-code-execution-vulnerability-cve-2021-44077</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-memory-corruption-vulnerability-cve-2021-38003</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-intents-improper-input-validation-vulnerability-cve-2021-38000</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-sql-injection-vulnerability-cve-2021-44026</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/metabase-geojson-api-local-file-inclusion-vulnerability-cve-2021-41277</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-remote-code-execution-vulnerability-cve-2021-42321</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-active-directory-domain-services-privilege-escalation-vulnerability-cve-2021-42278</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-active-directory-domain-services-privilege-escalation-vulnerability-cve-2021-42287</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-installer-privilege-escalation-vulnerability-cve-2021-41379</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-excel-security-feature-bypass-cve-2021-42292</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sitecore-xp-remote-command-execution-vulnerability-cve-2021-42237</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/bqe-billquick-web-suite-sql-injection-vulnerability-cve-2021-42258</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2021-41357</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/draytek-vigorconnect-path-traversal-vulnerability-cve-2021-20124</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/draytek-vigorconnect-path-traversal-vulnerability-cve-2021-20123</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2021-40450</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-win32k-privilege-escalation-vulnerability-cve-2021-40449</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-information-disclosure-vulnerability-cve-2021-37976</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-out-of-bounds-write-vulnerability-cve-2021-30632</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-indexed-db-api-use-after-free-vulnerability-cve-2021-30633</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-portals-use-after-free-vulnerability-cve-2021-37973</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-use-after-free-vulnerability-cve-2021-37975</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-path-traversal-vulnerability-cve-2021-42013</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/grafana-authentication-bypass-vulnerability-cve-2021-39226</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-path-traversal-vulnerability-cve-2021-41773</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-improper-access-control-cve-2021-22017</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/hikvision-improper-input-validation-cve-2021-36260</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-file-upload-rce-cve-2021-22005-september-2021</loc>
<lastmod>2026-05-13T01:12:14.99669+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/delta-electronics-dopsoft-2-improper-input-validation-vulnerability-cve-2021-38406</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-side-request-forgery-ssrf-cve-2021-40438</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-access-connectivity-engine-remote-code-execution-vulnerability-cve-2021-38646</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dahua-ip-camera-authentication-bypass-vulnerability-cve-2021-33045</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dahua-ip-camera-authentication-bypass-vulnerability-cve-2021-33044</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability-cve-2021-38649</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-mshtml-remote-code-execution-vulnerability-cve-2021-40444</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability-cve-2021-38645</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability-cve-2021-38648</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-open-management-infrastructure-omi-remote-code-execution-vulnerability-cve-2021-38647</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability-cve-2021-36955</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-netweaver-unrestricted-file-upload-vulnerability-cve-2021-38163</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/aviatrix-controller-unrestricted-upload-of-file-cve-2021-40870</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-adselfservice-plus-authentication-bypass-vulnerability-cve-2021-40539</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-use-after-free-vulnerability-cve-2021-28550</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-servicedesk-authentication-bypass-vulnerability-cve-2021-37415</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-server-and-data-center-object-graph-navigation-language-ognl-injection-vulnerab-cve-2021-26084</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/october-cms-improper-authentication-cve-2021-32648</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-integer-overflow-or-wraparound-vulnerability-cve-2021-30952</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/xstream-remote-code-execution-vulnerability-cve-2021-39144</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/realtek-ap-router-sdk-buffer-overflow-vulnerability-cve-2021-35395</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/realtek-jungle-sdk-remote-code-execution-vulnerability-cve-2021-35394</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-jira-server-and-data-center-path-traversal-vulnerability-cve-2021-26086</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sunhillo-sureline-os-command-injection-vulnerablity-cve-2021-36380</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-event-tracing-privilege-escalation-vulnerability-cve-2021-34486</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-local-security-authority-lsa-spoofing-vulnerability-cve-2021-36942</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-update-medic-service-privilege-escalation-vulnerability-cve-2021-36948</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-user-profile-service-privilege-escalation-vulnerability-cve-2021-34484</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2016-cumulative-update-kb5005030-august-2021</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exchange-server-proxyshell-rce-kb5004779-august-2021</loc>
<lastmod>2026-05-16T03:04:15.300026+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-server-pre-authorization-arbitrary-file-read-vulnerability-cve-2021-26085</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2021-30563</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-multiple-products-improper-input-validation-vulnerability-cve-2021-36742</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-multiple-products-improper-input-validation-vulnerability-cve-2021-36741</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-sam-local-privilege-escalation-vulnerability-cve-2021-36934</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/forgerock-access-management-am-core-server-remote-code-execution-vulnerability-cve-2021-35464</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-scripting-engine-memory-corruption-vulnerability-cve-2021-34448</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2021-33771</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-information-disclosure-vulnerability-cve-2021-31196</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2021-31979</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-information-disclosure-cve-2021-33766</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kaseya-virtual-systemserver-administrator-vsa-information-disclosure-vulnerability-cve-2021-30116</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-print-spooler-rce-kb5004946-july-2021</loc>
<lastmod>2026-05-10T16:31:39.428333+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-webgl-use-after-free-vulnerability-cve-2021-30554</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2021-30551</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openplc-scadabr-unrestricted-upload-of-file-with-dangerous-type-vulnerability-cve-2021-26828</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gitlab-server-side-request-forgery-ssrf-vulnerability-cve-2021-22175</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openplc-scadabr-cross-site-scripting-vulnerability-cve-2021-26829</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-enhanced-cryptographic-provider-privilege-escalation-vulnerability-cve-2021-31199</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-enhanced-cryptographic-provider-privilege-escalation-vulnerability-cve-2021-31201</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-information-disclosure-vulnerability-cve-2021-31955</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-remote-code-execution-vulnerability-cve-2021-33742</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntfs-privilege-escalation-vulnerability-cve-2021-31956</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-desktop-window-manager-dwm-core-library-privilege-escalation-vulnerability-cve-2021-33739</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-remote-code-execution-vulnerability-cve-2021-1675</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-popupblocker-security-bypass-vulnerability-cve-2021-30533</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/checkbox-survey-deserialization-of-untrusted-data-vulnerability-cve-2021-27852</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-vcenter-rce-cve-2021-21985-may-2021</loc>
<lastmod>2026-05-13T01:12:14.883102+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-nas-improper-authorization-vulnerability-cve-2021-28799</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-http-protocol-stack-remote-code-execution-vulnerability-cve-2021-31166</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tenda-ac11-router-stack-buffer-overflow-vulnerability-cve-2021-31755</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-hyperflex-hx-data-platform-command-injection-vulnerability-cve-2021-1498</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-hyperflex-hx-installer-virtual-machine-command-injection-vulnerability-cve-2021-1497</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dell-dbutil-driver-insufficient-access-control-vulnerability-cve-2021-21551</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arcadyan-buffalo-firmware-path-traversal-vulnerability-cve-2021-20090</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2021-21224</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-blink-use-after-free-vulnerability-cve-2021-21206</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-improper-input-validation-vulnerability-cve-2021-21220</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gitlab-community-and-enterprise-editions-remote-code-execution-vulnerability-cve-2021-22205</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exiftool-remote-code-execution-vulnerability-cve-2021-22204</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-network-attached-storage-nas-command-injection-vulnerability-cve-2020-2509</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2021-28310</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-server-side-request-forgery-in-vrealize-operations-manager-api-cve-2021-21975</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/micro-focus-access-manager-information-leakage-vulnerability-cve-2021-22506</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-blink-use-after-free-vulnerability-cve-2021-21193</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-remote-code-execution-vulnerability-cve-2021-27059</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-memory-corruption-vulnerability-cve-2021-26411</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-remote-code-execution-vulnerability-cve-2021-27085</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-race-condition-vulnerability-cve-2021-21166</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rockwell-multiple-products-insufficient-protected-credentials-vulnerability-cve-2021-22681</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exchange-server-proxylogon-rce-kb5000871-march-2021</loc>
<lastmod>2026-05-16T03:06:34.780004+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veritas-backup-exec-agent-command-execution-vulnerability-cve-2021-27878</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veritas-backup-exec-agent-file-access-vulnerability-cve-2021-27876</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veritas-backup-exec-agent-improper-authentication-vulnerability-cve-2021-27877</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2021-1732</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-and-cloud-foundation-server-side-request-forgery-ssrf-vulnerability-cve-2021-21973</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21972</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/accellion-fta-os-command-injection-vulnerability-cve-2021-27104</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/accellion-fta-os-command-injection-vulnerability-cve-2021-27102</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/accellion-fta-sql-injection-vulnerability-cve-2021-27101</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/accellion-fta-server-side-request-forgery-ssrf-vulnerability-cve-2021-27103</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/system-information-library-for-nodejs-command-injection-cve-2021-21315</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nagios-xi-os-command-injection-cve-2021-25298</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nagios-xi-os-command-injection-cve-2021-25296</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nagios-xi-os-command-injection-cve-2021-25297</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adminer-server-side-request-forgery-vulnerability-cve-2021-21311</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-heap-based-buffer-overflow-vulnerability-cve-2021-21017</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mcafee-total-protection-mtp-improper-privilege-management-vulnerability-cve-2021-23874</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-heap-buffer-overflow-vulnerability-cve-2021-21148</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/micro-focus-operation-bridge-report-obr-remote-code-execution-vulnerability-cve-2021-22502</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-helpdesk-improper-access-control-vulnerability-cve-2020-2506</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sudo-heap-based-buffer-overflow-vulnerability-cve-2021-3156</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/pear-archivetar-improper-link-resolution-vulnerability-cve-2020-36193</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-media-use-after-free-vulnerability-cve-2020-6572</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/laravel-ignition-file-upload-vulnerability-cve-2021-3129</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-defender-remote-code-execution-vulnerability-cve-2021-1647</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-use-after-free-vulnerability-cve-2020-16017</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-incorrect-implementation-vulnerabililty-cve-2020-16013</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-flink-improper-access-control-vulnerability-cve-2020-17519</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-orion-authentication-bypass-vulnerability-cve-2020-10148</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-xss-vulnerability-cve-2020-35730</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-struts-remote-code-execution-vulnerability-cve-2020-17530</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cyberoamos-cros-sql-injection-vulnerability-cve-2020-29574</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-remote-code-execution-vulnerability-cve-2020-17144</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/multiple-vmware-products-command-injection-vulnerability-cve-2020-4006</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/drupal-core-un-restricted-upload-of-file-cve-2020-13671</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/pear-archivetar-deserialization-of-untrusted-data-vulnerability-cve-2020-28949</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2020-17087</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-airflows-experimental-api-authentication-bypass-cve-2020-13927</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/saltstack-salt-shell-injection-vulnerability-cve-2020-16846</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2020-16009</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-freetype-heap-buffer-overflow-vulnerability-cve-2020-15999</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-remote-code-execution-vulnerability-cve-2020-14750</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-nas-file-station-cross-site-scripting-vulnerability-cve-2018-19943</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-nas-file-station-command-injection-vulnerability-cve-2018-19949</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-nas-file-station-cross-site-scripting-vulnerability-cve-2018-19953</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-remote-code-execution-vulnerability-cve-2020-14882</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-business-intelligence-enterprise-edition-path-transversal-cve-2020-14864</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-cross-site-scripting-xss-vulnerability-cve-2020-3580</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-solaris-and-zettabyte-file-system-zfs-unspecified-vulnerability-cve-2020-14871</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-unspecified-vulnerability-cve-2020-14883</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-openslp-use-after-free-vulnerability-cve-2020-3992</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sophos-sg-utm-remote-code-execution-vulnerability-cve-2020-25223</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-edge-and-internet-explorer-memory-corruption-vulnerability-cve-2020-0878</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wordpress-file-manager-plugin-remote-code-execution-vulnerability-cve-2020-25213</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-multiple-products-improper-access-control-vulnerability-cve-2020-24557</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-use-after-free-vulnerability-cve-2020-9715</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability-cve-2020-1380</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-spoofing-vulnerability-cve-2020-1464</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fuel-cms-sql-injection-vulnerability-cve-2020-17463</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vbulletin-php-module-remote-code-execution-vulnerability-cve-2020-17496</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-read-only-path-traversal-vulnerability-cve-2020-3452</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-airflow-command-injection-cve-2020-11978</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-remote-code-execution-vulnerability-cve-2020-14644</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-dns-server-remote-code-execution-vulnerability-cve-2020-1350</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-net-framework-sharepoint-and-visual-studio-remote-code-execution-vulnerability-cve-2020-1147</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-hyper-v-remotefx-vgpu-remote-code-execution-vulnerability-cve-2020-1040</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-netweaver-missing-authentication-for-critical-function-vulnerability-cve-2020-6287</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tenda-ac1900-router-ac15-model-remote-code-execution-vulnerability-cve-2020-10987</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/draytek-multiple-vigor-routers-os-command-injection-vulnerability-cve-2020-15415</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sophos-xg-firewall-buffer-overflow-vulnerability-cve-2020-15069</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/treck-tcpip-stack-out-of-bounds-read-vulnerability-cve-2020-11899</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2020-0986</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-xss-vulnerability-cve-2020-13965</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-tanzu-spring-cloud-config-directory-traversal-vulnerability-cve-2020-5410</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/pi-hole-adminlte-remote-code-execution-vulnerability-cve-2020-8816</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-kylin-os-command-injection-vulnerability-cve-2020-1956</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2020-1054</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/plex-media-server-remote-code-execution-vulnerability-cve-2020-5741</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ibm-data-risk-manager-security-bypass-vulnerability-cve-2020-4427</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ibm-data-risk-manager-remote-code-execution-vulnerability-cve-2020-4428</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ibm-data-risk-manager-directory-traversal-vulnerability-cve-2020-4430</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-information-disclosure-vulnerability-cve-2020-3259</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-remote-code-execution-vulnerability-cve-2020-12641</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/saltstack-salt-path-traversal-vulnerability-cve-2020-11652</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/saltstack-salt-authentication-bypass-vulnerability-cve-2020-11651</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jquery-cross-site-scripting-xss-vulnerability-cve-2020-11023</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sophos-sfos-sql-injection-vulnerability-cve-2020-12271</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-and-thunderbird-use-after-free-vulnerability-cve-2020-6819</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-and-thunderbird-use-after-free-vulnerability-cve-2020-6820</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-unspecified-vulnerability-cve-2020-2883</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability-cve-2020-0968</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-adobe-font-manager-library-remote-code-execution-vulnerability-cve-2020-1020</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-adobe-font-manager-library-remote-code-execution-vulnerability-cve-2020-0938</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2020-1027</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-ip-phones-web-server-remote-code-execution-and-denial-of-service-vulnerability-cve-2020-3161</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wordpress-snap-creek-duplicator-plugin-file-download-vulnerability-cve-2020-11738</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-information-disclosure-vulnerability-cve-2020-3952</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/amcrest-cameras-and-nvr-stack-based-buffer-overflow-vulnerability-cve-2020-5735</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonatype-nexus-repository-remote-code-execution-vulnerability-cve-2020-10199</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/liferay-portal-deserialization-of-untrusted-data-vulnerability-cve-2020-7961</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-multiple-products-content-validation-escape-vulnerability-cve-2020-8468</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-one-and-officescan-remote-code-execution-vulnerability-cve-2020-8467</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-one-and-officescan-authentication-bypass-vulnerability-cve-2020-8599</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-multiple-products-privilege-escalation-vulnerability-cve-2020-3950</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/unraid-remote-code-execution-vulnerability-cve-2020-5847</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/unraid-authentication-bypass-vulnerability-cve-2020-5849</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-smbv3-remote-code-execution-vulnerability-cve-2020-0796</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-background-intelligent-transfer-service-bits-improper-privilege-management-vulnera-cve-2020-0787</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sumavision-emr-cross-site-request-forgery-csrf-vulnerability-cve-2020-10181</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-solution-manager-missing-authentication-for-critical-function-vulnerability-cve-2020-6207</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-kernel-out-of-bounds-write-vulnerability-cve-2020-0041</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rconfig-os-command-injection-vulnerability-cve-2020-10221</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-desktop-central-file-upload-vulnerability-cve-2020-10189</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-and-thunderbird-type-confusion-vulnerability-cve-2019-17026</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2020-6418</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-tomcat-improper-privilege-management-vulnerability-cve-2020-1938</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-server-side-request-forgery-vulnerability-cve-2020-7796</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-validation-key-remote-code-execution-vulnerability-cve-2020-0688</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-installer-privilege-escalation-vulnerability-cve-2020-0683</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sql-server-reporting-services-remote-code-execution-vulnerability-cve-2020-0618</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability-cve-2020-0674</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/netis-wf2419-devices-remote-code-execution-vulnerability-cve-2019-19356</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/eyesofnetwork-improper-privilege-management-vulnerability-cve-2020-8655</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/teamviewer-desktop-bypass-remote-login-vulnerability-cve-2019-18988</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/eyesofnetwork-use-of-hard-coded-credentials-vulnerability-cve-2020-8657</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/playsms-server-side-template-injection-vulnerability-cve-2020-8644</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/multiple-draytek-vigor-routers-web-management-page-vulnerability-cve-2020-8515</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/opensmtpd-remote-code-execution-vulnerability-cve-2020-7247</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/whatsapp-cross-site-scripting-vulnerability-cve-2019-18426</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-fusion-middleware-unspecified-vulnerability-cve-2020-2551</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-multiple-products-remote-code-execution-vulnerability-cve-2020-2555</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-update-notification-manager-privilege-escalation-vulnerability-cve-2020-0638</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-cryptoapi-spoofing-vulnerability-cve-2020-0601</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-net-framework-remote-code-execution-vulnerability-cve-2020-0646</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-solr-velocityresponsewriter-plug-in-remote-code-execution-vulnerability-cve-2019-17558</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tvt-nvms-1000-directory-traversal-vulnerability-cve-2019-20085</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mongodb-mongo-express-remote-code-execution-vulnerability-cve-2019-10758</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ibm-planning-analytics-remote-code-execution-vulnerability-cve-2019-4716</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-telerik-ui-for-aspnet-ajax-deserialization-of-untrusted-data-vulnerability-cve-2019-18935</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2019-1458</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-and-horizon-daas-openslp-heap-based-buffer-overflow-vulnerability-cve-2019-5544</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-photo-station-improper-access-control-vulnerability-cve-2019-7192</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-qts-improper-input-validation-vulnerability-cve-2019-7193</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-photo-station-path-traversal-vulnerability-cve-2019-7195</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-photo-station-path-traversal-vulnerability-cve-2019-7194</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-rv-series-routers-deserialization-of-untrusted-data-vulnerability-cve-2019-15271</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-out-of-bounds-write-vulnerability-cve-2019-5825</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-webaudio-use-after-free-vulnerability-cve-2019-13720</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sangoma-freepbx-improper-authentication-vulnerability-cve-2019-19006</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability-cve-2019-1429</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-certificate-dialog-privilege-escalation-vulnerability-cve-2019-1388</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-appx-deployment-extensions-privilege-escalation-vulnerability-cve-2019-1385</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-universal-plug-and-play-upnp-service-privilege-escalation-vulnerability-cve-2019-1405</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/php-fastcgi-process-manager-fpm-buffer-overflow-vulnerability-cve-2019-11043</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-officescan-directory-traversal-vulnerability-cve-2019-18187</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-solaris-privilege-escalation-vulnerability-cve-2019-3010</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nostromo-nhttpd-directory-traversal-vulnerability-cve-2019-16278</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-kernel-use-after-free-vulnerability-cve-2019-2215</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-privilege-escalation-vulnerability-cve-2019-1322</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-error-reporting-manager-privilege-escalation-vulnerability-cve-2019-1315</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exim-out-of-bounds-write-vulnerability-cve-2019-16928</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vbulletin-php-module-remote-code-execution-vulnerability-cve-2019-16759</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability-cve-2019-1367</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/simalliance-toolbox-browser-command-injection-vulnerability-cve-2019-16256</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-privilege-common-log-file-system-clfs-escalation-vulnerability-cve-2019-1214</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-appx-deployment-server-privilege-escalation-vulnerability-cve-2019-1253</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-privilege-escalation-vulnerability-cve-2019-1215</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-excel-remote-code-execution-vulnerability-cve-2019-1297</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nagios-xi-remote-code-execution-vulnerability-cve-2019-15949</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/docker-desktop-community-edition-privilege-escalation-vulnerability-cve-2019-15752</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/webmin-command-injection-vulnerability-cve-2019-15107</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-commerce-cloud-deserialization-of-untrusted-data-vulnerability-cve-2019-0344</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-jira-server-and-data-center-server-side-template-injection-vulnerability-cve-2019-11581</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-solr-dataimporthandler-code-injection-vulnerability-cve-2019-0193</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-and-thunderbird-type-confusion-vulnerability-cve-2019-11707</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-and-thunderbird-sandbox-escape-vulnerability-cve-2019-11708</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-privilege-escalation-vulnerability-cve-2019-0880</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-appx-deployment-service-appxsvc-privilege-escalation-vulnerability-cve-2019-1129</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-appx-deployment-service-privilege-escalation-vulnerability-cve-2019-1130</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2019-1132</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dotnetnuke-dnn-inadequate-encryption-strength-vulnerability-cve-2018-18325</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dotnetnuke-dnn-inadequate-encryption-strength-vulnerability-cve-2018-15811</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nice-linear-emerge-e3-series-os-command-injection-vulnerability-cve-2019-7256</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-blink-use-after-free-vulnerability-cve-2019-5786</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-task-scheduler-privilege-escalation-vulnerability-cve-2019-1069</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-appx-deployment-service-appxsvc-privilege-escalation-vulnerability-cve-2019-1064</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ubiquiti-airos-command-injection-vulnerability-cve-2010-5330</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exim-mail-transfer-agent-mta-improper-input-validation-cve-2019-10149</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-crowd-and-crowd-data-center-remote-code-execution-vulnerability-cve-2019-11580</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sitecore-cms-and-experience-platform-xp-deserialization-vulnerability-cve-2019-9874</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sitecore-cms-and-experience-platform-xp-deserialization-vulnerability-cve-2019-9875</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-improper-restriction-of-xml-external-entity-reference-cve-2019-9670</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-gdi-remote-code-execution-vulnerability-cve-2019-0903</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-error-reporting-wer-privilege-escalation-vulnerability-cve-2019-0863</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/whatsapp-voip-stack-buffer-overflow-vulnerability-cve-2019-3568</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/lg-n1a1-nas-remote-command-execution-vulnerability-cve-2018-14839</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sierra-wireless-airlink-aleos-unrestricted-upload-of-file-with-dangerous-type-vulnerability-cve-2018-4063</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/crestron-multiple-products-command-injection-vulnerability-cve-2019-3929</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-server-side-request-forgery-ssrf-vulnerability-cve-2019-9621</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-injection-cve-2019-2725</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-bi-publisher-unauthorized-access-vulnerability-cve-2019-2616</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-server-and-data-center-path-traversal-vulnerability-cve-2019-3398</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-type-confusion-vulnerability-cve-2019-0752</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2019-0797</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smb-information-disclosure-vulnerability-cve-2019-0703</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2019-0808</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-appx-deployment-service-appxsvc-privilege-escalation-vulnerability-cve-2019-0841</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2019-0859</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2019-0803</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/reolink-multiple-ip-cameras-os-command-injection-vulnerability-cve-2019-11001</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rails-ruby-on-rails-path-traversal-vulnerability-cve-2019-5418</loc>
<lastmod>2026-05-16T03:25:30.794578+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kentico-xperience-deserialization-of-untrusted-data-vulnerability-cve-2019-10068</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-server-and-data-center-server-side-template-injection-vulnerability-cve-2019-3396</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kibana-arbitrary-code-execution-cve-2019-7609</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wordpress-social-warfare-plugin-cross-site-scripting-xss-vulnerability-cve-2019-9978</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonatype-nexus-repository-manager-incorrect-access-control-vulnerability-cve-2019-7238</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jenkins-matrix-project-plugin-remote-code-execution-vulnerability-cve-2019-1003030</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jenkins-script-security-plugin-sandbox-bypass-vulnerability-cve-2019-1003029</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tibco-jasperreports-library-directory-traversal-vulnerability-cve-2018-18809</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-information-disclosure-vulnerability-cve-2019-0676</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-remote-code-execution-vulnerability-cve-2019-0604</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/thinkphp-remote-code-execution-vulnerability-cve-2019-9082</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/drupal-core-remote-code-execution-vulnerability-cve-2019-6340</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-servicedesk-plus-sdp-file-upload-vulnerability-cve-2019-8394</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kaseya-vsa-remote-code-execution-vulnerability-cve-2018-20753</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/winrar-absolute-path-traversal-vulnerability-cve-2018-20250</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kaseya-vsa-sql-injection-vulnerability-cve-2017-18362</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-routers-improper-input-validation-vulnerability-cve-2019-1652</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv320-and-rv325-routers-information-disclosure-vulnerability-cve-2019-1653</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-flash-player-use-after-free-vulnerability-cve-2018-15982</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-privilege-escalation-vulnerability-cve-2019-0543</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-mshtml-remote-code-execution-vulnerability-cve-2019-0541</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gigabyte-multiple-products-unspecified-vulnerability-cve-2018-19320</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gigabyte-multiple-products-privilege-escalation-vulnerability-cve-2018-19323</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gigabyte-multiple-products-code-execution-vulnerability-cve-2018-19322</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gigabyte-multiple-products-privilege-escalation-vulnerability-cve-2018-19321</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability-cve-2018-8653</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2018-8611</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-win32k-improper-resource-shutdown-or-release-vulnerability-cve-2018-8639</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-out-of-bounds-write-vulnerability-cve-2018-17480</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/thinkphp-nonecms-remote-code-execution-vulnerability-cve-2018-20062</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jenkins-stapler-web-framework-deserialization-of-untrusted-data-vulnerability-cve-2018-1000861</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/paessler-prtg-network-monitor-local-file-inclusion-vulnerability-cve-2018-19410</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2018-8589</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-integer-overflow-vulnerability-cve-2018-6065</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-privilege-escalation-vulnerability-cve-2018-8581</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-remote-code-execution-vulnerability-cve-2018-17463</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/red-hat-jboss-richfaces-framework-expression-language-injection-vulnerability-cve-2018-14667</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tenda-ac7-ac9-and-ac10-routers-command-injection-vulnerability-cve-2018-14558</loc>
<lastmod>2026-05-16T03:25:33.423959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2018-8453</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-integer-overflow-vulnerability-cve-2018-14634</loc>
<lastmod>2026-05-16T02:21:16.834883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-unrestricted-file-upload-vulnerability-cve-2018-15961</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-privilege-escalation-vulnerability-cve-2018-8440</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-struts-remote-code-execution-vulnerability-cve-2018-11776</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-directx-graphics-kernel-privilege-escalation-vulnerability-cve-2018-8406</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-scripting-engine-memory-corruption-vulnerability-cve-2018-8373</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-directx-graphics-kernel-privilege-escalation-vulnerability-cve-2018-8405</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-shell-remote-code-execution-vulnerability-cve-2018-8414</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/laravel-deserialization-of-untrusted-data-vulnerability-cve-2018-15133</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nuuo-nvrmini-devices-os-command-injection-vulnerability-cve-2018-14933</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mikrotik-router-os-directory-traversal-vulnerability-cve-2018-14847</loc>
<lastmod>2026-05-16T03:25:30.174137+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/drupal-core-remote-code-execution-vulnerability-cve-2018-7602</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/chakracore-scripting-engine-type-confusion-vulnerability-cve-2018-8298</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-double-free-vulnerability-cve-2018-4990</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-flash-player-stack-based-buffer-overflow-vulnerability-cve-2018-5002</loc>
<lastmod>2026-05-16T03:25:32.106631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/paessler-prtg-network-monitor-os-command-injection-vulnerability-cve-2018-9276</loc>
<lastmod>2026-05-16T03:25:31.032853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-firefox-esr-and-thunderbird-use-after-free-vulnerability-cve-2016-9079</loc>
<lastmod>2026-05-16T03:25:31.662806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-sd-wan-edge-by-velocloud-command-injection-vulnerability-cve-2018-6961</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-adaptive-security-appliance-asa-denial-of-service-vulnerability-cve-2018-0296</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/quest-kace-system-management-appliance-remote-command-execution-vulnerability-cve-2018-11138</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2018-4939</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2018-8120</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-vbscript-engine-out-of-bounds-write-vulnerability-cve-2018-8174</loc>
<lastmod>2026-05-16T03:25:32.97689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-com-for-windows-deserialization-of-untrusted-data-vulnerability-cve-2018-0824</loc>
<lastmod>2026-05-16T03:25:33.670088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dasan-gpon-routers-command-injection-vulnerability-cve-2018-10562</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dasan-gpon-routers-authentication-bypass-vulnerability-cve-2018-10561</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-unspecified-vulnerability-cve-2018-2628</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tibco-jasperreports-server-information-disclosure-vulnerability-cve-2018-5430</loc>
<lastmod>2026-05-16T03:25:31.892114+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-tanzu-spring-data-commons-property-binder-vulnerability-cve-2018-1273</loc>
<lastmod>2026-05-16T03:25:32.30959+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/drupal-core-remote-code-execution-vulnerability-cve-2018-7600</loc>
<lastmod>2026-05-16T03:25:33.190128+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
</urlset>
