<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://ironsmithintel.com</loc>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://ironsmithintel.com/hardening</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/linux-kernel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-v8</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-office</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-and-ios-xe-software</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-flash-player</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/samsung-mobile-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-internet-explorer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-win32k</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qualcomm-multiple-chipsets</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-ios-ipados-and-macos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/palo-alto-networks-pan-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-exchange-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/synacor-zimbra-collaboration-suite-zcs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-ios</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-fortios</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-java-se</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-pulse-connect-secure</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/juniper-junos-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-endpoint-manager-mobile-epmm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-coldfusion</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-software</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/arm-mali-graphics-processing-unit-gpu</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-acrobat-and-reader</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-xr</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/android-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mozilla-firefox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-macos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zyxel-multiple-firewalls</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chrome</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-vcenter-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-and-ios-xe</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/f5-big-ip</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zoho-manageengine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-application-delivery-controller-adc-gateway-and-sd-wan-wanop-appliance</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-software</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-ios-and-macos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-endpoint-manager-epm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-fortios-and-fortiproxy</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-ios-ipados-and-watchos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-ios-and-ipados</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-tomcat</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sap-netweaver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/veeam-backup--replication</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-sharepoint</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/smartertools-smartermail</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/crushftp-crushftp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-fortiweb</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-weblogic-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rarlab-winrar</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/craft-cms-craft-cms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-struts</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/palo-alto-networks-expedition</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/connectwise-screenconnect</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-multiple-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-forticlient-ems</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-cloud-services-appliance-csa</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/solarwinds-web-help-desk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/android-kernel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-sonicos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-netscaler-adc-and-netscaler-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/telemessage-tm-sgnl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-sonicwall-email-security</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dassault-systmes-delmia-apriso</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-software-and-cisco-ios-xe-software</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-sql-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openssl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/putty</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/samsung-magicinfo-9-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-fortigate</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-open-management-infrastructure-omi</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-xe</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/eyesofnetwork-eyesofnetwork</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/meta-platforms-whatsapp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-reader-and-acrobat</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-word</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-anyconnect-secure</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-e-business-suite</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-fusion-middleware</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-xe-software</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-small-business-rv160-rv260-rv340-and-rv345-series-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-confluence-data-center-and-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/drupal-core</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-xr-and-xe-software</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jetbrains-teamcity</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tp-link-multiple-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dotnetnuke-dnn-dotnetnuke-dnn</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-session-recording</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-sd-wan-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-connect-secure-policy-secure-and-zta-gateways</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openplc-scadabr</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-network-attached-storage-nas</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wing-ftp-server-wing-ftp-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-active-directory</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-sma100-appliances</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-netscaler-adc-and-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dcs-2530l-and-dcs-2670l-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zyxel-dsl-cpe-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gigabyte-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dasan-gigabit-passive-optical-network-gpon-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/geovision-multiple-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zyxel-multiple-network-attached-storage-nas-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-netscaler</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-adaptive-security-appliance-asa</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/roundcube-webmail</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-adaptive-security-appliance-asa-and-firepower-threat-defense-ftd</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-multiple-nas-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/arm-mali-gpu-kernel-driver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-859-router</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sudo-sudo</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/watchguard-firebox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gladinet-centrestack-and-triofox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kaseya-virtual-systemserver-administrator-vsa</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sangoma-freepbx</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rails-ruby-on-rails</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mikrotik-routeros</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/osgeo-geoserver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sophos-firewall</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netgear-multiple-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/simplehelp-simplehelp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kentico-xperience-cms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-sma100</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-sd-wan-and-netscaler</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-os-x</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-secure-firewall-adaptive-security-appliance-and-secure-firewall-threat-defense</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/n-able-n-central</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/papercut-ngmf</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-identity-services-engine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sysaid-sysaid-on-prem</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nodejs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sqlite</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openssh-for-windows</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-iis</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/palo-alto-pan-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--clfs-driver</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--dwm-core-library</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dns-320-device</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-adc--netscaler-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/servicenow-utah-vancouver-and-washington-dc-now-platform</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-vmware-esxi-and-horizon-daas</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-connect-secure</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/exim-mail-transfer-agent-mta</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonatype-nexus-repository-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/paessler-prtg-network-monitor</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--scripting-engine</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/twilio-authy</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--remote-desktop-client</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows--remote-desktop-gateway-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-defender-for-identity</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-one-apex-one-as-a-service-and-worry-free-business-security</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/laravel-laravel-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-superset</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/asus-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/elastic-elasticsearch</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-internet-information-services-iis</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ptzoptics-pt30x-sdindi-cameras</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/commvault-web-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mdaemon-email-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/solarview-compact</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-adaptive-security-appliance-and-firepower-threat-defense</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/teamviewer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-net-framework-sharepoint-visual-studio</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/solarwinds-virtualization-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-flash-player-and-air</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-crowd-and-crowd-data-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-network-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-intelligence-enterprise-edition</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vbulletin-vbulletin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/beyondtrust-privileged-remote-access-pra-and-remote-support-rs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-log4j</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/curl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-esxi-workstation-and-fusion</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-powerpoint</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/python</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openssh</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/git</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-moveit-transfer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zoom</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/winrar</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/north-grid-proself</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/winscp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/net-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-secure-firewall-management-center-fmc</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-pulse-connect-secure-and-pulse-policy-secure</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-sd-wan-controller-and-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/symantec-symantec-messaging-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-one-officescan-and-worry-free-business-security</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-internet-explorer-and-edge</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-rv-series-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ibm-websphere-application-server-and-server-hypervisor-edition</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-office-and-wordpad</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zoho-desktop-central</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-solr</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fatpipe-warp-ipvpn-and-mpvpn-software</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-project</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-windows-cng-key-isolation-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wordpress-social-warfare-plugin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-sharepoint-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-sma1000-appliance</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/webkitgtk-webkitgtk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-http-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/omnissa-workspace-one-uem</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/aviatrix-aviatrix-controller</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/draytek-multiple-vigor-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chrome-blink</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/thinkphp-thinkphp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/check-point-quantum-security-gateways</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/looking-glass-multi-router-looking-glass-mrlg</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gnu-bourne-again-shell-bash</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-unified-communications-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/synacor-zimbra-collaborate-suite-zcs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tp-link-archer-ax21</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nostromo-nhttpd</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/quest-kace-systems-management-appliance-sma</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-sentry</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hewlett-packard-hp-procurve-manager-pcm-pcm-identity-driven-manager-idm-and-application-lifecycle-management</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tj-actions-changed-files-github-action</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tenda-ac1900-router-ac15-model</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ubiquiti-airos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-photo-station</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/barracuda-networks-email-security-gateway-esg-appliance</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-http-protocol-stack</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-xml-core-services</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/quest-kace-system-management-appliance</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-skia</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-hyperflex-hx</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/draytek-vigorconnect</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sumavision-enhanced-multimedia-router-emr</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-bi-publisher-formerly-xml-publisher</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hitachi-vantara-pentaho-business-analytics-ba-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/october-cms-october-cms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-secure-access-control-system-acs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apple-ios-macos-watchos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-kylin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-java-runtime-environment-jre</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zabbix-frontend</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mitel-mivoice-connect</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/bqe-billquick-web-suite</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-central</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-content-collaboration</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/realtek-ap-router-sdk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/langflow-langflow</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-solaris-and-zettabyte-file-system-zfs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kingsoft-wps-office</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/teclib-glpi</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-cisco-ip-phones</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/reolink-rlc-410w-ip-camera</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/commvault-command-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/vmware-sd-wan-edge</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/drupal-drupal-core</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netwrix-auditor</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/saltstack-salt</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-graphics-device-interface-gdi</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/crestron-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rejetto-http-file-server-hfs</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-ofbiz</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/asus-rt-ax55-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/artifex-ghostscript</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zyxel-p660hn-t1a-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-telerik-report-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/elastic-kibana</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/roundcube-roundcube-webmail</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-net-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mcafee-mcafee-total-protection-mtp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/oracle-java-se-and-jrockit</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sitecore-cms-and-experience-platform-xp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/minio-minio</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/accellion-fta</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/embedthis-goahead</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/openssl-openssl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/plex-media-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-power-pages</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/audinate-dante-discovery</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ibm-data-risk-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-jboss</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/dahua-ip-camera-firmware</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-acrobat-and-reader-flash-player</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sophos-xg-firewall</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/docker-desktop-community-edition</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/spreadsheetparseexcel-spreadsheetparseexcel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/asus-live-update</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-one-officescan-and-worry-free-business-security-agents</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-qnap-network-attached-storage-nas</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wordpress-file-manager-plugin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/juniper-screenos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tp-link-tl-wa855re</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/versa-concerto</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-wsftp-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/yealink-device-management</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hikvision-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ami-megarac-spx</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/delta-electronics-dopsoft-2</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/marimo-marimo</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-jboss-richfaces-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wso2-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mitel-micollab-mivoice-business-express</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sugarcrm-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/liferay-liferay-portal</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios-ios-xr-and-ios-xe</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-jboss-application-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gnu-gnu-bash</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nuuo-nvrmini-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-bitbucket-server-and-data-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zyxel-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/veritas-backup-exec-agent</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-silverlight</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/hewlett-packard-enterprise-hpe-oneview</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/red-hat-jboss-seam-2</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/imagemagick-imagemagick</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/notepad-notepad</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-graphics-component</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-cloud-services-appliance</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-600-router</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fuel-cms-fuel-cms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-visual-basic-for-applications-vba</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/pi-hole-adminlte</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mongodb-mongo-express</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/siemens-simatic-cp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/intel-ethernet-diagnostics-driver-for-windows</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/realtek-jungle-software-development-kit-sdk</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sap-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dsl-2750b-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gnu-inetutils</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-hugegraph-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nice-linear-emerge-e3-series</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/draytek-vigor-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wordpress-snap-creek-duplicator-plugin</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/exim-exim-internet-mailer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-4500-series-switches-and-cisco-catalyst-4500-x-series-switches</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/teamt5-threatsonar-anti-ransomware</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-6800-series-switches</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-directx-graphics-kernel-dxgkrnl</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-820-router</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zyxel-emg2926-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fxc-ae1021-ae1021pe</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cyberpersons-cyberpanel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-dawn</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/webrtc-webrtc</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-endpoint-manager-mobile-epmm-and-mobileiron-core</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qlik-sense</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/nextgen-healthcare-mirth-connect</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/primetek-primefaces-application</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-endpoint-manager-cloud-service-appliance-epm-csa</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-virtual-traffic-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jenkins-jenkins-stapler-web-framework</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mongodb-mongodb-and-mongodb-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mitel-sip-phones</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/digiever-ds-2105-pro</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/wazuh-wazuh-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/berriai-litellm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-confluence-serverdata-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-wordpad</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/xwiki-platform</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/progress-kemp-loadmaster</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-connect-secure-policy-secure-and-neurons</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-httpsys</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/osgeo-jai-ext</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sap-solution-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sciencelogic-sl1</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/zoho-manageengine-servicedesk-plus-sdp</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-nx-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-defender</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/synacor-zimbra-collaboration-suite</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/solarwinds-orion</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-streaming-service</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tibco-jasperreports</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qnap-viostor-nvr</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-sma1000-appliances</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rconfig-rconfig</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-edge-and-internet-explorer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/array-networks-arrayos-ag</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-820l</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sierra-wireless-airlink-aleos</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-300-router</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/atlassian-confluence-server-and-data-center</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-exchange</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-smbv1-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/meta-react-server-components</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/f5-big-ip-configuration-utility</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/indusoft-web-studio</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dnr-322l</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netis-wf2419-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-spark</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/android-pixel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-ios</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-hyper-v-remotefx</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tenda-ac7-ac9-and-ac10-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-input-method-editor-ime-japanese</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chromium-intents</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mitel-micollab</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tp-link-tl-wr841n</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-application-delivery-controller-adc-and-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-fortios-and-fortiadc</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-605-router</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/qualcomm-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice--music-snapdragon-wearables</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortinet-fortimanager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/gladinet-triofox</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cwp-control-web-panel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dwl-2600ap-access-point</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/broadcom-vmware-aria-operations-and-vmware-tools</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-commerce-and-magento</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/motex-lanscope-endpoint-manager</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dns-320-storage-device</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/schneider-electric-umotion-builder</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-experience-manager-aem-forms</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-pixel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/igel-igel-os</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-secure-remote-access-sra</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-client-server-run-time-subsystem-csrss</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-edge</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/skysea-client-view</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-sharefile</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/grafana-labs-grafana</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-610-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netgear-dgn2200-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-netscaler-sd-wan-enterprise-cloudbridge-virtual-wan-and-xenmobile-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netgear-wireless-access-point-wap-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netgear-wnr2000v5-router</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dcs-930l-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/tp-link-multiple-archer-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-and-trendnet-multiple-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dsl-2760u</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/pulse-secure-pulse-connect-secure</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netgear-wireless-router-dgn2200</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netgear-multiple-routers</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mozilla-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/jenkins-jenkins</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/smartbedded-meteobridge</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/libraesva-email-security-gateway</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/fortra-goanywhere-mft</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adminer-adminer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-smart-licensing-utility</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-smbv1</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-645-router</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-sma-100-appliances</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/grandstream-ucm6200</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/f5-big-ip-traffic-management-microkernel</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/android-runtime</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sitecore-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/perl-exiftool</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/mediatek-multiple-chipsets</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/arm-trusted-firmware</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-storefront-server</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-825-r1-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/citrix-workspace-application-and-receiver-for-windows</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/f5-big-ip-and-big-iq-centralized-management</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/google-chrome-for-android-ui</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-mobileiron-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/git-git</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trend-micro-apex-one</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/netgear-jgs516pe-devices</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/sonicwall-sslvpn-sma100</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-sd-wan</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/microsoft-microsoft</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/webpros-cpanel--whm-and-wp2-wordpress-squared</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/d-link-dir-823x</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/php-phpmailer</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/cisco-catalyst-sd-wan-manger</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/kentico-kentico-xperience</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/apache-activemq</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/adobe-acrobat</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/trueconf-client</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/aquasecurity-trivy</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/laravel-livewire</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/n8n-n8n</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/ivanti-endpoint-manager-epm</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/rockwell-multiple-products</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/software/broadcom-vmware-aria-operations</loc>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-controller-authentication-bypass-vulnerability-cve-2026-20182</loc>
<lastmod>2026-05-17T02:01:46.384175+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-cross-site-scripting-vulnerability-cve-2026-42897</loc>
<lastmod>2026-05-17T02:02:34.825591+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2025-cumulative-update-kb5082126-may-2026</loc>
<lastmod>2026-05-10T13:54:41.350121+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/berriai-litellm-sql-injection-vulnerability-cve-2026-42208</loc>
<lastmod>2026-05-17T02:02:43.539591+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/third-party-runtime-outdated-dependencies-general</loc>
<lastmod>2026-05-07T12:11:44.581701+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-backup-agent-outdated-general</loc>
<lastmod>2026-05-07T12:11:44.488414+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-click-to-run-missing-update-general</loc>
<lastmod>2026-05-07T12:11:44.399908+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-openssh-outdated-general</loc>
<lastmod>2026-05-07T12:11:44.30896+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-iis-missing-security-patch-general</loc>
<lastmod>2026-05-07T12:11:44.218776+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-end-of-support-2012-general</loc>
<lastmod>2026-05-07T12:11:44.120858+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2016-missing-cumulative-update-kb5055521-april-2026</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-missing-cumulative-update-kb5055519-april-2026</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-windows-defender-enabled-hardening</loc>
<lastmod>2026-05-07T12:11:43.851828+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-remote-registry-disabled-hardening</loc>
<lastmod>2026-05-07T12:11:43.762407+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-guest-account-disabled-hardening</loc>
<lastmod>2026-05-07T12:11:43.670067+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-smb-signing-required-hardening</loc>
<lastmod>2026-05-07T12:11:43.577103+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-powershell-script-block-logging-enabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.834316+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-rdp-nla-enforced-hardening</loc>
<lastmod>2026-05-07T20:52:19.729438+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-smbv1-protocol-disabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.61631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-ntlmv1-protocol-disabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.383431+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-lsass-protection-enabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.045355+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/putty-rsa-nonce-bias-cve-2024-31497</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openssl-infinite-loop-cve-2022-0778</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/curl-heap-buffer-overflow-cve-2023-38545</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-integer-overflow-cve-2023-6345</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-out-of-bounds-memory-cve-2024-0519</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-type-confusion-cve-2023-7024</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-printnightmare-cve-2021-34527</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-proxylogon-cve-2021-26855</loc>
<lastmod>2026-05-16T03:06:36.277155+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-netlogon-zerologon-cve-2020-1472</loc>
<lastmod>2026-05-16T03:04:17.543181+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-log4j-remote-code-execution-cve-2021-44228</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-improper-input-validation-vulnerability-cve-2026-6973</loc>
<lastmod>2026-05-17T02:01:51.932912+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-pan-os-out-of-bounds-write-vulnerability-cve-2026-0300</loc>
<lastmod>2026-05-17T02:01:27.250168+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-buffer-overflow-cve-2023-4863</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-missing-cumulative-update-kb5055526-april-2026</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sql-server-missing-security-update-general</loc>
<lastmod>2026-05-03T00:25:23.345765+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sqlite-heap-buffer-overflow-cve-2024-0232</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-wdigest-authentication-disabled-hardening</loc>
<lastmod>2026-05-07T20:52:19.273224+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/webpros-cpanel-whm-and-wp2-wordpress-squared-missing-authentication-for-critical-function-vulnerabil-cve-2026-41940</loc>
<lastmod>2026-05-17T02:03:11.930535+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-incorrect-resource-transfer-between-spheres-vulnerability-cve-2026-31431</loc>
<lastmod>2026-05-17T02:02:35.956911+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-defender-insufficient-granularity-of-access-control-vulnerability-cve-2026-33825</loc>
<lastmod>2026-05-17T02:02:50.465009+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-protection-mechanism-failure-vulnerability-cve-2026-32202</loc>
<lastmod>2026-05-17T02:02:18.655229+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-server-improper-input-validation-vulnerability-cve-2026-32201</loc>
<lastmod>2026-05-17T02:02:48.201234+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-prototype-pollution-vulnerability-cve-2026-34621</loc>
<lastmod>2026-05-17T02:01:19.788074+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/marimo-remote-code-execution-vulnerability-cve-2026-39987</loc>
<lastmod>2026-05-17T02:01:43.315486+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-activemq-improper-input-validation-vulnerability-cve-2026-34197</loc>
<lastmod>2026-05-17T02:02:09.208797+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-forticlient-ems-improper-access-control-vulnerability-cve-2026-35616</loc>
<lastmod>2026-05-17T02:01:11.45561+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-dawn-use-after-free-vulnerability-cve-2026-5281</loc>
<lastmod>2026-05-17T02:02:39.963636+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trueconf-client-download-of-code-without-integrity-check-vulnerability-cve-2026-3502</loc>
<lastmod>2026-05-17T02:02:22.449352+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-netscaler-out-of-bounds-read-vulnerability-cve-2026-3055</loc>
<lastmod>2026-05-17T02:02:05.837086+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/aquasecurity-trivy-embedded-malicious-code-vulnerability-cve-2026-33634</loc>
<lastmod>2026-05-17T02:01:30.935081+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/langflow-code-injection-vulnerability-cve-2026-33017</loc>
<lastmod>2026-05-17T02:01:24.092644+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-skia-out-of-bounds-write-vulnerability-cve-2026-3909</loc>
<lastmod>2026-05-17T02:01:13.84966+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-vulnerabi-cve-2026-3910</loc>
<lastmod>2026-05-17T02:01:52.549212+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-secure-firewall-management-center-fmc-software-and-cisco-security-cloud-control-scc-firewall-m-cve-2026-20131</loc>
<lastmod>2026-05-17T02:01:06.435712+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-memory-corruption-vulnerability-cve-2026-21385</loc>
<lastmod>2026-05-17T02:02:14.483034+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-controller-and-manager-authentication-bypass-vulnerability-cve-2026-20127</loc>
<lastmod>2026-05-17T02:01:07.271827+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-manager-exposure-of-sensitive-information-to-an-unauthorized-actor-vulnerabili-cve-2026-20133</loc>
<lastmod>2026-05-17T02:01:19.160103+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-manager-incorrect-use-of-privileged-apis-vulnerability-cve-2026-20122</loc>
<lastmod>2026-05-17T02:02:12.826855+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-catalyst-sd-wan-manager-storing-passwords-in-a-recoverable-format-vulnerability-cve-2026-20128</loc>
<lastmod>2026-05-17T02:02:14.053024+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/broadcom-vmware-aria-operations-command-injection-vulnerability-cve-2026-22719</loc>
<lastmod>2026-05-17T02:02:14.313089+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dell-recoverpoint-for-virtual-machines-rp4vms-use-of-hard-coded-credentials-vulnerability-cve-2026-22769</loc>
<lastmod>2026-05-17T02:02:50.296303+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-css-use-after-free-vulnerability-cve-2026-2441</loc>
<lastmod>2026-05-17T02:02:45.088917+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/soliton-systems-kk-filezen-os-command-injection-vulnerability-cve-2026-25108</loc>
<lastmod>2026-05-17T02:01:36.541422+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-buffer-overflow-vulnerability-cve-2026-20700</loc>
<lastmod>2026-05-17T02:01:01.893705+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-shell-protection-mechanism-failure-vulnerability-cve-2026-21510</loc>
<lastmod>2026-05-17T02:01:30.301563+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-epm-authentication-bypass-vulnerability-cve-2026-1603</loc>
<lastmod>2026-05-17T02:03:07.017827+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-mshtml-framework-protection-mechanism-failure-vulnerability-cve-2026-21513</loc>
<lastmod>2026-05-17T02:01:53.084346+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-improper-privilege-management-vulnerability-cve-2026-21533</loc>
<lastmod>2026-05-17T02:02:12.911445+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-type-confusion-vulnerability-cve-2026-21519</loc>
<lastmod>2026-05-17T02:02:48.460463+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-null-pointer-dereference-vulnerability-cve-2026-21525</loc>
<lastmod>2026-05-17T02:01:03.203812+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-word-reliance-on-untrusted-inputs-in-a-security-decision-vulnerability-cve-2026-21514</loc>
<lastmod>2026-05-17T02:01:45.246329+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-forticlient-ems-sql-injection-vulnerability-cve-2026-21643</loc>
<lastmod>2026-05-17T02:01:31.653147+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/beyondtrust-remote-support-rs-and-privileged-remote-access-pra-os-command-injection-vulnerability-cve-2026-1731</loc>
<lastmod>2026-05-17T02:02:23.48498+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/notepad-download-of-code-without-integrity-check-vulnerability-cve-2025-15556</loc>
<lastmod>2026-05-17T02:01:52.993884+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-code-injection-vulnerability-cve-2026-1340</loc>
<lastmod>2026-05-17T02:00:58.615332+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-code-injection-vulnerability-cve-2026-1281</loc>
<lastmod>2026-05-17T02:02:50.12222+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability-cve-2025-40551</loc>
<lastmod>2026-05-17T02:02:46.552814+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-security-control-bypass-vulnerability-cve-2025-40536</loc>
<lastmod>2026-05-17T02:01:21.51037+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-multiple-products-authentication-bypass-using-an-alternate-path-or-channel-vulnerability-cve-2026-24858</loc>
<lastmod>2026-05-17T02:01:39.433971+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-security-feature-bypass-vulnerability-cve-2026-21509</loc>
<lastmod>2026-05-17T02:01:06.899324+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/smartertools-smartermail-missing-authentication-for-critical-function-vulnerability-cve-2026-24423</loc>
<lastmod>2026-05-17T02:01:04.942307+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/smartertools-smartermail-authentication-bypass-using-an-alternate-path-or-channel-vulnerability-cve-2026-23760</loc>
<lastmod>2026-05-17T02:01:02.659236+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-unified-communications-products-code-injection-vulnerability-cve-2026-20045</loc>
<lastmod>2026-05-17T02:01:10.194206+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gnu-inetutils-argument-injection-vulnerability-cve-2026-24061</loc>
<lastmod>2026-05-17T02:01:59.545133+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-deserialization-of-untrusted-data-vulnerability-cve-2026-20963</loc>
<lastmod>2026-05-17T02:01:01.406856+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-information-disclosure-vulnerability-cve-2026-20805</loc>
<lastmod>2026-05-17T02:02:23.747479+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-vulnerability-cve-2025-66376</loc>
<lastmod>2026-05-17T02:03:04.307711+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/smartertools-smartermail-unrestricted-upload-of-file-with-dangerous-type-vulnerability-cve-2025-52691</loc>
<lastmod>2026-05-17T02:01:35.053249+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-php-remote-file-inclusion-vulnerability-cve-2025-68645</loc>
<lastmod>2026-05-17T02:03:08.244211+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mongodb-and-mongodb-server-improper-handling-of-length-parameter-inconsistency-vulnerability-cve-2025-14847</loc>
<lastmod>2026-05-17T02:01:42.50545+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/watchguard-firebox-out-of-bounds-write-vulnerability-cve-2025-14733</loc>
<lastmod>2026-05-17T02:02:39.530152+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/n8n-improper-control-of-dynamically-managed-code-resources-vulnerability-cve-2025-68613</loc>
<lastmod>2026-05-17T02:01:24.643419+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-sma1000-missing-authorization-vulnerability-cve-2025-40602</loc>
<lastmod>2026-05-17T03:27:13.010666+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-vulnerability-cve-2025-68461</loc>
<lastmod>2026-05-17T02:02:03.914596+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/asus-live-update-embedded-malicious-code-vulnerability-cve-2025-59374</loc>
<lastmod>2026-05-17T03:27:38.890278+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-use-after-free-webkit-vulnerability-cve-2025-43529</loc>
<lastmod>2026-05-17T03:28:11.378243+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-multiple-products-improper-input-validation-vulnerability-cve-2025-20393</loc>
<lastmod>2026-05-17T02:01:31.736964+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/hewlett-packard-enterprise-hpe-oneview-code-injection-vulnerability-cve-2025-37164</loc>
<lastmod>2026-05-17T02:01:51.590202+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gladinet-centrestack-and-triofox-hard-coded-cryptographic-vulnerability-cve-2025-14611</loc>
<lastmod>2026-05-17T02:01:27.607517+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-out-of-bounds-memory-access-vulnerability-cve-2025-14174</loc>
<lastmod>2026-05-17T02:01:02.933049+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-classic-buffer-overflow-vulnerability-cve-2025-43520</loc>
<lastmod>2026-05-17T02:02:11.804007+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-improper-locking-vulnerability-cve-2025-43510</loc>
<lastmod>2026-05-17T02:03:06.42042+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gogs-path-traversal-vulnerability-cve-2025-8110</loc>
<lastmod>2026-05-17T02:01:14.295941+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-multiple-products-improper-verification-of-cryptographic-signature-vulnerability-cve-2025-59718</loc>
<lastmod>2026-05-17T03:28:14.278131+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-use-after-free-vulnerability-cve-2025-62221</loc>
<lastmod>2026-05-17T02:01:31.478749+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-information-disclosure-vulnerability-cve-2025-48633</loc>
<lastmod>2026-05-17T02:02:18.208045+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-privilege-escalation-vulnerability-cve-2025-48572</loc>
<lastmod>2026-05-17T02:01:48.648893+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/array-networks-arrayos-ag-os-command-injection-vulnerability-cve-2025-66644</loc>
<lastmod>2026-05-17T02:01:57.342644+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/meta-react-server-components-remote-code-execution-vulnerability-cve-2025-55182</loc>
<lastmod>2026-05-17T02:02:35.864892+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/osgeo-geoserver-improper-restriction-of-xml-external-entity-reference-vulnerability-cve-2025-58360</loc>
<lastmod>2026-05-17T02:02:48.716975+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortiweb-os-command-injection-vulnerability-cve-2025-58034</loc>
<lastmod>2026-05-17T03:29:46.459269+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2025-13223</loc>
<lastmod>2026-05-17T02:02:20.979965+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortiweb-path-traversal-vulnerability-cve-2025-64446</loc>
<lastmod>2026-05-17T03:27:11.561431+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-race-condition-vulnerability-cve-2025-62215</loc>
<lastmod>2026-05-17T02:02:33.433855+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-link-following-vulnerability-cve-2025-60710</loc>
<lastmod>2026-05-17T02:02:42.74845+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gladinet-triofox-improper-access-control-vulnerability-cve-2025-12480</loc>
<lastmod>2026-05-17T02:02:49.770943+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sangoma-freepbx-os-command-injection-vulnerability-cve-2025-64328</loc>
<lastmod>2026-05-17T02:03:05.80716+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-use-after-free-vulnerability-cve-2023-43000</loc>
<lastmod>2026-05-17T02:03:06.590915+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/react-native-community-cli-os-command-injection-vulnerability-cve-2025-11953</loc>
<lastmod>2026-05-17T02:01:41.802164+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-fusion-middleware-missing-authentication-for-critical-function-vulnerability-cve-2025-61757</loc>
<lastmod>2026-05-17T02:01:04.757652+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/motex-lanscope-endpoint-manager-improper-verification-of-source-of-a-communication-channel-vulnerabi-cve-2025-61932</loc>
<lastmod>2026-05-17T02:01:05.686049+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/f5-big-ip-stack-based-buffer-overflow-vulnerability-cve-2025-53521</loc>
<lastmod>2026-05-17T02:01:43.671668+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5044284-october-2025</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-untrusted-pointer-dereference-vulnerability-cve-2025-24990</loc>
<lastmod>2026-05-17T02:02:52.968005+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-improper-access-control-vulnerability-cve-2025-59230</loc>
<lastmod>2026-05-17T02:02:30.00055+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-server-update-service-wsus-deserialization-of-untrusted-data-vulnerability-cve-2025-59287</loc>
<lastmod>2026-05-17T02:03:05.019001+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-e-business-suite-server-side-request-forgery-ssrf-vulnerability-cve-2025-61884</loc>
<lastmod>2026-05-17T02:02:18.914553+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gladinet-centrestack-and-triofox-files-or-directories-accessible-to-external-parties-vulnerability-cve-2025-11371</loc>
<lastmod>2026-05-17T02:01:26.25708+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-e-business-suite-unspecified-vulnerability-cve-2025-61882</loc>
<lastmod>2026-05-17T02:02:47.849748+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/broadcom-vmware-aria-operations-and-vmware-tools-privilege-defined-with-unsafe-actions-vulnerability-cve-2025-41244</loc>
<lastmod>2026-05-17T02:02:06.96938+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-secure-firewall-adaptive-security-asa-appliance-and-secure-firewall-threat-defense-ftd-missing-cve-2025-20362</loc>
<lastmod>2026-05-17T02:01:46.471149+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-secure-firewall-adaptive-security-appliance-asa-and-secure-firewall-threat-defense-ftd-buffer--cve-2025-20333</loc>
<lastmod>2026-05-17T02:02:53.944813+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-ios-and-ios-xe-software-snmp-denial-of-service-and-remote-code-execution-vulnerability-cve-2025-20352</loc>
<lastmod>2026-05-17T03:57:15.58666+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2025-10585</loc>
<lastmod>2026-05-17T02:02:23.398633+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability-cve-2025-26399</loc>
<lastmod>2026-05-17T02:02:58.960648+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cwp-control-web-panel-os-command-injection-vulnerability-cve-2025-48703</loc>
<lastmod>2026-05-17T02:02:48.286887+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/libraesva-email-security-gateway-command-injection-vulnerability-cve-2025-59689</loc>
<lastmod>2026-05-17T02:02:36.218642+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortra-goanywhere-mft-deserialization-of-untrusted-data-vulnerability-cve-2025-10035</loc>
<lastmod>2026-05-17T02:01:28.153556+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/watchguard-firebox-out-of-bounds-write-vulnerability-cve-2025-9242</loc>
<lastmod>2026-05-17T02:03:07.796385+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-out-of-bounds-write-vulnerability-cve-2025-21043</loc>
<lastmod>2026-05-17T03:28:03.732469+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-out-of-bounds-write-vulnerability-cve-2025-21042</loc>
<lastmod>2026-05-17T03:30:20.095176+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-cumulative-update-kb5043050-september-2025</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-commerce-and-magento-improper-input-validation-vulnerability-cve-2025-54236</loc>
<lastmod>2026-05-17T02:01:49.083979+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-runtime-use-after-free-vulnerability-cve-2025-48543</loc>
<lastmod>2026-05-17T02:02:24.533594+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sitecore-multiple-products-deserialization-of-untrusted-data-vulnerability-cve-2025-53690</loc>
<lastmod>2026-05-17T02:02:30.266977+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tp-link-archer-c7eu-and-tl-wr841nndms-os-command-injection-vulnerability-cve-2025-9377</loc>
<lastmod>2026-05-17T03:27:16.289367+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/meta-platforms-whatsapp-incorrect-authorization-vulnerability-cve-2025-55177</loc>
<lastmod>2026-05-17T02:01:26.346384+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sangoma-freepbx-authentication-bypass-vulnerability-cve-2025-57819</loc>
<lastmod>2026-05-17T02:02:20.724059+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-netscaler-memory-overflow-vulnerability-cve-2025-7775</loc>
<lastmod>2026-05-17T03:27:42.490239+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-out-of-bounds-write-vulnerability-cve-2025-43300</loc>
<lastmod>2026-05-17T03:28:09.665836+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/n-able-n-central-command-injection-vulnerability-cve-2025-8876</loc>
<lastmod>2026-05-17T02:01:25.080774+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/n-able-n-central-insecure-deserialization-vulnerability-cve-2025-8875</loc>
<lastmod>2026-05-17T02:01:46.128931+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2016-cumulative-update-kb5041160-august-2025</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rarlab-winrar-path-traversal-vulnerability-cve-2025-8088</loc>
<lastmod>2026-05-17T02:01:05.328026+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-experience-manager-forms-code-execution-vulnerability-cve-2025-54253</loc>
<lastmod>2026-05-17T02:01:34.053142+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-one-os-command-injection-vulnerability-cve-2025-54948</loc>
<lastmod>2026-05-17T02:02:58.354144+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dassault-systmes-delmia-apriso-code-injection-vulnerability-cve-2025-6204</loc>
<lastmod>2026-05-17T02:02:12.144001+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dassault-systmes-delmia-apriso-missing-authorization-vulnerability-cve-2025-6205</loc>
<lastmod>2026-05-17T02:01:46.645925+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-buffer-overflow-vulnerability-cve-2025-31277</loc>
<lastmod>2026-05-17T02:01:23.032793+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-time-of-check-time-of-use-toctou-race-condition-vulnerability-cve-2025-38352</loc>
<lastmod>2026-05-17T03:27:39.393227+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-deserialization-of-untrusted-data-vulnerability-cve-2025-53770</loc>
<lastmod>2026-05-17T02:02:29.915992+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/prettier-eslint-config-prettier-embedded-malicious-code-vulnerability-cve-2025-54313</loc>
<lastmod>2026-05-17T02:01:30.847767+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/crushftp-unprotected-alternate-channel-vulnerability-cve-2025-54309</loc>
<lastmod>2026-05-17T02:02:34.388971+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortiweb-sql-injection-vulnerability-cve-2025-25257</loc>
<lastmod>2026-05-17T03:28:13.605269+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/laravel-livewire-code-injection-vulnerability-cve-2025-54068</loc>
<lastmod>2026-05-17T02:01:49.950813+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-identity-services-engine-injection-vulnerability-cve-2025-20337</loc>
<lastmod>2026-05-17T02:02:27.663835+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-angle-and-gpu-improper-input-validation-vulnerability-cve-2025-6558</loc>
<lastmod>2026-05-17T02:01:16.963915+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wing-ftp-server-information-disclosure-vulnerability-cve-2025-47813</loc>
<lastmod>2026-05-17T02:01:23.651557+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wing-ftp-server-improper-neutralization-of-null-byte-or-nul-character-vulnerability-cve-2025-47812</loc>
<lastmod>2026-05-17T02:01:32.619013+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-code-injection-vulnerability-cve-2025-49704</loc>
<lastmod>2026-05-17T02:00:59.470272+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/git-link-following-vulnerability-cve-2025-48384</loc>
<lastmod>2026-05-17T02:01:45.156433+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-improper-authentication-vulnerability-cve-2025-49706</loc>
<lastmod>2026-05-17T02:01:52.907225+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sudo-inclusion-of-functionality-from-untrusted-control-sphere-vulnerability-cve-2025-32463</loc>
<lastmod>2026-05-17T02:01:34.234512+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2025-6554</loc>
<lastmod>2026-05-17T02:03:00.716241+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-netscaler-adc-and-gateway-buffer-overflow-vulnerability-cve-2025-6543</loc>
<lastmod>2026-05-17T03:28:21.269157+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-identity-services-engine-injection-vulnerability-cve-2025-20281</loc>
<lastmod>2026-05-17T02:01:17.998508+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/quest-kace-systems-management-appliance-sma-improper-authentication-vulnerability-cve-2025-32975</loc>
<lastmod>2026-05-17T02:01:11.006706+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-vulnerability-cve-2025-48700</loc>
<lastmod>2026-05-17T02:01:54.742439+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rarlab-winrar-path-traversal-vulnerability-cve-2025-6218</loc>
<lastmod>2026-05-17T02:02:51.49767+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-netscaler-adc-and-gateway-out-of-bounds-read-vulnerability-cve-2025-5777</loc>
<lastmod>2026-05-17T03:27:29.044093+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-unspecified-vulnerability-cve-2025-43200</loc>
<lastmod>2026-05-17T02:00:58.520415+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-external-control-of-file-name-or-path-vulnerability-cve-2025-33053</loc>
<lastmod>2026-05-17T02:01:52.019406+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smb-client-improper-access-control-vulnerability-cve-2025-33073</loc>
<lastmod>2026-05-17T02:02:47.586857+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/igel-os-use-of-a-key-past-its-expiration-date-vulnerability-cve-2025-47827</loc>
<lastmod>2026-05-17T02:01:16.132833+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-use-after-free-vulnerability-cve-2025-27038</loc>
<lastmod>2026-05-17T02:00:58.999513+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-incorrect-authorization-vulnerability-cve-2025-21479</loc>
<lastmod>2026-05-17T03:27:38.197685+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-incorrect-authorization-vulnerability-cve-2025-21480</loc>
<lastmod>2026-05-17T03:27:30.621236+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-out-of-bounds-read-and-write-vulnerability-cve-2025-5419</loc>
<lastmod>2026-05-17T02:02:31.430466+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-deserialization-of-untrusted-data-vulnerability-cve-2025-49113</loc>
<lastmod>2026-05-17T02:01:53.786756+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dassault-systmes-delmia-apriso-deserialization-of-untrusted-data-vulnerability-cve-2025-5086</loc>
<lastmod>2026-05-17T02:02:43.356676+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/telemessage-tm-sgnl-initialization-of-a-resource-with-an-insecure-default-vulnerability-cve-2025-48927</loc>
<lastmod>2026-05-17T02:02:37.692159+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/telemessage-tm-sgnl-exposure-of-core-dump-file-to-an-unauthorized-control-sphere-vulnerability-cve-2025-48928</loc>
<lastmod>2026-05-17T02:02:41.272248+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/versa-concerto-improper-authentication-vulnerability-cve-2025-34026</loc>
<lastmod>2026-05-17T02:01:41.97744+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/smartbedded-meteobridge-command-injection-vulnerability-cve-2025-4008</loc>
<lastmod>2026-05-17T02:02:09.642839+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-magicinfo-9-server-path-traversal-vulnerability-cve-2025-4632</loc>
<lastmod>2026-05-17T03:57:16.79051+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-clfs-driver-eop-cve-2025-32701-may-2025</loc>
<lastmod>2026-05-16T03:06:37.786241+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-dwm-core-eop-cve-2025-30400-may-2025</loc>
<lastmod>2026-05-16T03:06:40.946768+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5058385-may-2025</loc>
<lastmod>2026-05-15T23:55:00.861213+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-cumulative-update-kb5058392-may-2025</loc>
<lastmod>2026-05-15T23:55:00.996087+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2025-cumulative-update-kb5058411-may-2025</loc>
<lastmod>2026-05-15T23:55:01.097831+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-scripting-engine-memory-corruption-cve-2025-30397-may-2025</loc>
<lastmod>2026-05-16T03:04:13.934492+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-remote-desktop-heap-overflow-cve-2025-29966-may-2025</loc>
<lastmod>2026-05-15T23:55:01.502663+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/remote-desktop-gateway-heap-overflow-cve-2025-29967-may-2025</loc>
<lastmod>2026-05-15T23:55:01.598535+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/defender-for-identity-spoofing-cve-2025-26685-may-2025</loc>
<lastmod>2026-05-15T23:56:29.902315+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-code-injection-vulnerability-cve-2025-4428</loc>
<lastmod>2026-05-17T03:56:41.943164+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-authentication-bypass-vulnerability-cve-2025-4427</loc>
<lastmod>2026-05-17T03:27:38.013364+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-multiple-products-stack-based-buffer-overflow-vulnerability-cve-2025-32756</loc>
<lastmod>2026-05-17T03:27:41.982718+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-netweaver-deserialization-vulnerability-cve-2025-42999</loc>
<lastmod>2026-05-17T02:01:01.988168+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/telemessage-tm-sgnl-hidden-functionality-vulnerability-cve-2025-47729</loc>
<lastmod>2026-05-17T02:03:07.880654+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/craft-cms-external-control-of-assumed-immutable-web-parameter-vulnerability-cve-2025-35939</loc>
<lastmod>2026-05-17T02:01:27.077783+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sysaid-on-prem-improper-restriction-of-xml-external-entity-reference-vulnerability-cve-2025-2775</loc>
<lastmod>2026-05-17T02:01:18.71662+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sysaid-on-prem-improper-restriction-of-xml-external-entity-reference-vulnerability-cve-2025-2776</loc>
<lastmod>2026-05-17T02:03:07.102624+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/srimax-output-messenger-directory-traversal-vulnerability-cve-2025-27920</loc>
<lastmod>2026-05-17T02:03:11.499938+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/commvault-web-server-unspecified-vulnerability-cve-2025-3928</loc>
<lastmod>2026-05-17T02:01:01.120075+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/craft-cms-code-injection-vulnerability-cve-2025-32432</loc>
<lastmod>2026-05-17T02:01:47.60592+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/connectwise-screenconnect-improper-authentication-vulnerability-cve-2025-3935</loc>
<lastmod>2026-05-17T02:02:38.922755+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-netweaver-unrestricted-file-upload-vulnerability-cve-2025-31324</loc>
<lastmod>2026-05-17T02:02:56.689153+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/broadcom-brocade-fabric-os-code-injection-vulnerability-cve-2025-1976</loc>
<lastmod>2026-05-17T02:01:28.875334+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/commvault-command-center-path-traversal-vulnerability-cve-2025-34028</loc>
<lastmod>2026-05-17T02:01:25.980118+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualitia-active-mail-stack-based-buffer-overflow-vulnerability-cve-2025-42599</loc>
<lastmod>2026-05-17T02:03:10.096572+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-memory-corruption-vulnerability-cve-2025-31200</loc>
<lastmod>2026-05-17T03:31:44.507314+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-arbitrary-read-and-write-vulnerability-cve-2025-31201</loc>
<lastmod>2026-05-17T03:27:38.544794+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/erlang-erlangotp-ssh-server-missing-authentication-for-critical-function-vulnerability-cve-2025-32433</loc>
<lastmod>2026-05-17T02:01:48.82239+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/yiiframework-yii-improper-protection-of-alternate-path-vulnerability-cve-2024-58136</loc>
<lastmod>2026-05-17T02:03:10.798832+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-use-after-free-vulnerability-cve-2025-29824</loc>
<lastmod>2026-05-17T02:01:45.774428+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/langflow-missing-authentication-vulnerability-cve-2025-3248</loc>
<lastmod>2026-05-17T02:02:18.566219+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-connect-secure-policy-secure-and-zta-gateways-stack-based-buffer-overflow-vulnerability-cve-2025-22457</loc>
<lastmod>2026-05-17T03:56:10.28716+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/crushftp-authentication-bypass-vulnerability-cve-2025-31161</loc>
<lastmod>2026-05-17T02:02:33.52212+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gladinet-centrestack-and-triofox-use-of-hard-coded-cryptographic-key-vulnerability-cve-2025-30406</loc>
<lastmod>2026-05-17T02:03:08.516741+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vite-vitejs-improper-access-control-vulnerability-cve-2025-31125</loc>
<lastmod>2026-05-17T02:02:30.527245+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-mojo-sandbox-escape-vulnerability-cve-2025-2783</loc>
<lastmod>2026-05-17T02:02:40.314461+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dir-823x-command-injection-vulnerability-cve-2025-29635</loc>
<lastmod>2026-05-17T02:01:36.190416+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kentico-xperience-cms-authentication-bypass-using-an-alternate-path-or-channel-vulnerability-cve-2025-2746</loc>
<lastmod>2026-05-17T02:03:05.985521+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kentico-xperience-cms-authentication-bypass-using-an-alternate-path-or-channel-vulnerability-cve-2025-2747</loc>
<lastmod>2026-05-17T02:01:37.843853+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kentico-xperience-path-traversal-vulnerability-cve-2025-2749</loc>
<lastmod>2026-05-17T02:02:08.195798+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/reviewdogaction-setup-github-action-embedded-malicious-code-vulnerability-cve-2025-30154</loc>
<lastmod>2026-05-17T02:02:44.836599+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tj-actionschanged-files-github-action-embedded-malicious-code-vulnerability-cve-2025-30066</loc>
<lastmod>2026-05-17T02:01:11.557874+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/juniper-junos-os-improper-isolation-or-compartmentalization-vulnerability-cve-2025-21590</loc>
<lastmod>2026-05-17T03:27:30.45657+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-vulnerability-cve-2025-27915</loc>
<lastmod>2026-05-17T02:02:32.741968+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-management-console-mmc-improper-neutralization-vulnerability-cve-2025-26633</loc>
<lastmod>2026-05-17T02:01:39.612705+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ami-megarac-spx-authentication-bypass-by-spoofing-vulnerability-cve-2024-54085</loc>
<lastmod>2026-05-17T02:01:43.217431+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-fast-fat-file-system-driver-integer-overflow-vulnerability-cve-2025-24985</loc>
<lastmod>2026-05-17T02:02:44.748867+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-out-of-bounds-write-vulnerability-cve-2025-24201</loc>
<lastmod>2026-05-17T03:56:28.337088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-win32k-use-after-free-vulnerability-cve-2025-24983</loc>
<lastmod>2026-05-17T02:01:32.092438+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/freetype-out-of-bounds-write-vulnerability-cve-2025-27363</loc>
<lastmod>2026-05-17T02:01:55.348501+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntfs-out-of-bounds-read-vulnerability-cve-2025-24991</loc>
<lastmod>2026-05-17T02:01:25.620503+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntfs-information-disclosure-vulnerability-cve-2025-24984</loc>
<lastmod>2026-05-17T02:03:09.391144+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntlm-hash-disclosure-spoofing-vulnerability-cve-2025-24054</loc>
<lastmod>2026-05-17T02:01:14.658234+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntfs-heap-based-buffer-overflow-vulnerability-cve-2025-24993</loc>
<lastmod>2026-05-17T02:02:04.002244+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-tomcat-path-equivalence-vulnerability-cve-2025-24813</loc>
<lastmod>2026-05-17T02:02:34.478733+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/edimax-ic-7100-ip-camera-os-command-injection-vulnerability-cve-2025-1316</loc>
<lastmod>2026-05-17T02:02:25.572602+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-workstation-and-fusion-information-disclosure-vulnerability-cve-2025-22226</loc>
<lastmod>2026-05-17T02:01:04.848453+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nakivo-backup-and-replication-absolute-path-traversal-vulnerability-cve-2024-48248</loc>
<lastmod>2026-05-17T02:02:31.16285+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-arbitrary-write-vulnerability-cve-2025-22225</loc>
<lastmod>2026-05-17T02:02:16.995494+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-and-workstation-toctou-race-condition-vulnerability-cve-2025-22224</loc>
<lastmod>2026-05-17T02:02:36.134791+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/xwiki-platform-eval-injection-vulnerability-cve-2025-24893</loc>
<lastmod>2026-05-17T02:02:46.891432+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-power-pages-improper-access-control-vulnerability-cve-2025-24989</loc>
<lastmod>2026-05-17T02:01:35.229697+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-pan-os-authentication-bypass-vulnerability-cve-2025-0108</loc>
<lastmod>2026-05-17T03:27:42.65773+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-pan-os-file-read-vulnerability-cve-2025-0111</loc>
<lastmod>2026-05-17T03:56:52.553562+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortios-and-fortiproxy-authentication-bypass-vulnerability-cve-2025-24472</loc>
<lastmod>2026-05-17T03:28:21.629039+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-storage-link-following-vulnerability-cve-2025-21391</loc>
<lastmod>2026-05-17T02:02:25.480816+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ancillary-function-driver-for-winsock-heap-based-buffer-overflow-vulnerability-cve-2025-21418</loc>
<lastmod>2026-05-17T02:01:33.960601+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wazuh-server-deserialization-of-untrusted-data-vulnerability-cve-2025-24016</loc>
<lastmod>2026-05-17T02:02:43.448085+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-and-ipados-incorrect-authorization-vulnerability-cve-2025-24200</loc>
<lastmod>2026-05-17T03:56:39.890913+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trimble-cityworks-deserialization-vulnerability-cve-2025-0994</loc>
<lastmod>2026-05-17T02:01:35.759884+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-dsl-cpe-os-command-injection-vulnerability-cve-2024-40890</loc>
<lastmod>2026-05-17T03:30:28.034405+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-dsl-cpe-os-command-injection-vulnerability-cve-2024-40891</loc>
<lastmod>2026-05-17T03:31:01.444697+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/digiever-ds-2105-pro-missing-authorization-vulnerability-cve-2023-52163</loc>
<lastmod>2026-05-17T02:02:02.716755+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/advantive-veracore-sql-injection-vulnerability-cve-2025-25181</loc>
<lastmod>2026-05-17T02:02:29.404802+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/advantive-veracore-unrestricted-file-upload-vulnerability-cve-2024-57968</loc>
<lastmod>2026-05-17T02:02:04.700008+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-use-after-free-vulnerability-cve-2025-24085</loc>
<lastmod>2026-05-17T03:27:47.195676+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/7-zip-mark-of-the-web-bypass-vulnerability-cve-2025-0411</loc>
<lastmod>2026-05-17T02:02:10.602312+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-sma1000-appliances-deserialization-vulnerability-cve-2025-23006</loc>
<lastmod>2026-05-17T03:30:10.433953+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/craft-cms-code-injection-vulnerability-cve-2025-23209</loc>
<lastmod>2026-05-17T02:02:51.582503+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/simplehelp-path-traversal-vulnerability-cve-2024-57728</loc>
<lastmod>2026-05-17T02:02:57.650017+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/simplehelp-missing-authorization-vulnerability-cve-2024-57726</loc>
<lastmod>2026-05-17T02:02:51.150911+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/simplehelp-path-traversal-vulnerability-cve-2024-57727</loc>
<lastmod>2026-05-17T02:03:04.126386+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-ole-rce-cve-2025-21298-january-2025</loc>
<lastmod>2026-05-16T13:16:57.083582+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-hyper-v-nt-kernel-integration-vsp-use-after-free-vulnerability-cve-2025-21335</loc>
<lastmod>2026-05-17T02:03:05.104007+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-epm-absolute-path-traversal-vulnerability-cve-2024-13161</loc>
<lastmod>2026-05-17T03:30:35.319152+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-epm-absolute-path-traversal-vulnerability-cve-2024-13159</loc>
<lastmod>2026-05-17T03:31:19.822912+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortios-and-fortiproxy-authentication-bypass-vulnerability-cve-2024-55591</loc>
<lastmod>2026-05-17T03:56:05.775088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-hyper-v-nt-kernel-integration-vsp-use-after-free-vulnerability-cve-2025-21334</loc>
<lastmod>2026-05-17T02:02:03.146747+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-hyper-v-nt-kernel-integration-vsp-heap-based-buffer-overflow-vulnerability-cve-2025-21333</loc>
<lastmod>2026-05-17T02:02:06.80071+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-epm-absolute-path-traversal-vulnerability-cve-2024-13160</loc>
<lastmod>2026-05-17T03:31:12.130129+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-sonicos-sslvpn-improper-authentication-vulnerability-cve-2024-53704</loc>
<lastmod>2026-05-17T03:27:43.294161+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-connect-secure-policy-secure-and-zta-gateways-stack-based-buffer-overflow-vulnerability-cve-2025-0282</loc>
<lastmod>2026-05-17T03:27:24.514565+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/aviatrix-controllers-os-command-injection-vulnerability-cve-2024-50603</loc>
<lastmod>2026-05-17T02:02:04.086784+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-out-of-bounds-access-vulnerability-cve-2024-53197</loc>
<lastmod>2026-05-17T03:56:37.642118+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/draytek-vigor-routers-os-command-injection-vulnerability-cve-2024-12987</loc>
<lastmod>2026-05-17T02:02:01.57294+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-pan-os-malicious-dns-packet-vulnerability-cve-2024-3393</loc>
<lastmod>2026-05-17T03:28:04.321754+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-out-of-bounds-read-vulnerability-cve-2024-53150</loc>
<lastmod>2026-05-17T03:30:21.686919+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/beyondtrust-privileged-remote-access-pra-and-remote-support-rs-os-command-injection-vulnerability-cve-2024-12686</loc>
<lastmod>2026-05-17T02:01:04.565615+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/craft-cms-code-injection-vulnerability-cve-2024-56145</loc>
<lastmod>2026-05-17T02:01:16.311126+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/beyondtrust-privileged-remote-access-pra-and-remote-support-rs-command-injection-vulnerability-cve-2024-12356</loc>
<lastmod>2026-05-17T02:03:11.147797+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cleo-multiple-products-unauthenticated-file-upload-vulnerability-cve-2024-55956</loc>
<lastmod>2026-05-17T02:01:51.501097+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-heap-based-buffer-overflow-vulnerability-cve-2024-49138</loc>
<lastmod>2026-05-17T02:01:53.441027+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-ldap-rce-cve-2024-49112-december-2024</loc>
<lastmod>2026-05-16T13:16:57.22883+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-micollab-path-traversal-vulnerability-cve-2024-55550</loc>
<lastmod>2026-05-17T02:03:06.675032+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-out-of-bounds-write-vulnerability-cve-2024-53104</loc>
<lastmod>2026-05-17T02:01:05.867673+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-multiple-firewalls-path-traversal-vulnerability-cve-2024-11667</loc>
<lastmod>2026-05-17T03:27:35.675462+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-partner-center-improper-access-control-vulnerability-cve-2024-49035</loc>
<lastmod>2026-05-17T02:02:19.261686+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/projectsend-improper-authentication-vulnerability-cve-2024-11680</loc>
<lastmod>2026-05-17T02:02:34.299065+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-cross-site-scripting-xss-vulnerability-cve-2024-44309</loc>
<lastmod>2026-05-17T03:27:13.681267+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-code-execution-vulnerability-cve-2024-44308</loc>
<lastmod>2026-05-17T03:29:58.069007+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-use-of-uninitialized-resource-vulnerability-cve-2024-50302</loc>
<lastmod>2026-05-17T03:28:18.182584+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-pan-os-management-interface-authentication-bypass-vulnerability-cve-2024-0012</loc>
<lastmod>2026-05-17T03:31:15.289627+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-pan-os-management-interface-os-command-injection-vulnerability-cve-2024-9474</loc>
<lastmod>2026-05-17T03:29:57.336635+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-agile-product-lifecycle-management-plm-incorrect-authorization-vulnerability-cve-2024-21287</loc>
<lastmod>2026-05-17T02:02:44.146949+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mdaemon-email-server-cross-site-scripting-xss-vulnerability-cve-2024-11182</loc>
<lastmod>2026-05-17T02:01:01.610359+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/geovision-devices-os-command-injection-vulnerability-cve-2024-11120</loc>
<lastmod>2026-05-17T02:01:41.369859+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-privilege-escalation-vulnerability-cve-2024-43093</loc>
<lastmod>2026-05-17T02:02:04.266472+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-nt-kernel-eop-cve-2024-43623-november-2024</loc>
<lastmod>2026-05-16T13:16:57.363103+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-adcs-eop-cve-2024-49019-november-2024</loc>
<lastmod>2026-05-16T13:16:57.492604+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-session-recording-deserialization-of-untrusted-data-vulnerability-cve-2024-8069</loc>
<lastmod>2026-05-17T03:57:14.083129+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-session-recording-improper-privilege-management-vulnerability-cve-2024-8068</loc>
<lastmod>2026-05-17T03:28:04.136566+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-task-scheduler-privilege-escalation-vulnerability-cve-2024-49039</loc>
<lastmod>2026-05-17T02:01:39.701493+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntlmv2-hash-disclosure-spoofing-vulnerability-cve-2024-43451</loc>
<lastmod>2026-05-17T02:03:13.866638+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cyberpanel-incorrect-default-permissions-vulnerability-cve-2024-51378</loc>
<lastmod>2026-05-17T02:02:39.444354+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cyberpanel-incorrect-default-permissions-vulnerability-cve-2024-51567</loc>
<lastmod>2026-05-17T02:03:08.060726+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cleo-multiple-products-unrestricted-file-upload-vulnerability-cve-2024-50623</loc>
<lastmod>2026-05-17T02:02:47.241416+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortimanager-missing-authentication-vulnerability-cve-2024-47575</loc>
<lastmod>2026-05-17T03:56:41.358175+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-denial-of-service-vulnerability-cve-2024-20481</loc>
<lastmod>2026-05-17T02:02:46.376104+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-micollab-path-traversal-vulnerability-cve-2024-41713</loc>
<lastmod>2026-05-17T02:01:29.411795+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sciencelogic-sl1-unspecified-vulnerability-cve-2024-9537</loc>
<lastmod>2026-05-17T02:02:51.239371+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/firefox-use-after-free-rce-cve-2024-9680-october-2024</loc>
<lastmod>2026-05-13T01:12:15.109334+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-expedition-os-command-injection-vulnerability-cve-2024-9463</loc>
<lastmod>2026-05-17T03:27:24.089441+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-expedition-sql-injection-vulnerability-cve-2024-9465</loc>
<lastmod>2026-05-17T03:29:54.982554+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-cloud-services-appliance-csa-os-command-injection-vulnerability-cve-2024-9380</loc>
<lastmod>2026-05-17T03:27:41.796985+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-cloud-services-appliance-csa-sql-injection-vulnerability-cve-2024-9379</loc>
<lastmod>2026-05-17T03:56:34.095226+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-configuration-manager-sql-injection-vulnerability-cve-2024-43468</loc>
<lastmod>2026-05-17T02:03:05.453059+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-management-console-remote-code-execution-vulnerability-cve-2024-43572</loc>
<lastmod>2026-05-17T02:03:12.100946+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-spoofing-vulnerability-cve-2024-43573</loc>
<lastmod>2026-05-17T02:02:56.858464+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-use-after-free-vulnerability-cve-2024-43047</loc>
<lastmod>2026-05-17T03:57:27.024367+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-command-execution-vulnerability-cve-2024-45519</loc>
<lastmod>2026-05-17T02:01:46.990958+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-cloud-services-appliance-csa-path-traversal-vulnerability-cve-2024-8963</loc>
<lastmod>2026-05-17T03:30:06.651074+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ptzoptics-pt30x-sdindi-cameras-os-command-injection-vulnerability-cve-2024-8957</loc>
<lastmod>2026-05-17T02:01:01.21609+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-privilege-escalation-vulnerability-cve-2024-38813</loc>
<lastmod>2026-05-17T02:03:08.688149+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-heap-based-buffer-overflow-vulnerability-cve-2024-38812</loc>
<lastmod>2026-05-17T02:02:12.655801+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ptzoptics-pt30x-sdindi-cameras-authentication-bypass-vulnerability-cve-2024-8956</loc>
<lastmod>2026-05-17T02:01:04.214368+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-installer-improper-privilege-management-vulnerability-cve-2024-38014</loc>
<lastmod>2026-05-17T02:02:11.718509+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-cloud-services-appliance-os-command-injection-vulnerability-cve-2024-8190</loc>
<lastmod>2026-05-17T03:27:46.993502+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mark-of-the-web-motw-protection-mechanism-failure-vulnerability-cve-2024-38217</loc>
<lastmod>2026-05-17T02:02:26.101306+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-publisher-protection-mechanism-failure-vulnerability-cve-2024-38226</loc>
<lastmod>2026-05-17T02:01:25.351023+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-spoofing-vulnerability-cve-2024-43461</loc>
<lastmod>2026-05-17T02:03:01.429123+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veeam-backup-unauthenticated-rce-cve-2024-40711-september-2024</loc>
<lastmod>2026-05-13T01:12:16.094679+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-smart-licensing-utility-static-credential-vulnerability-cve-2024-20439</loc>
<lastmod>2026-05-17T02:01:37.4086+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-ofbiz-forced-browsing-vulnerability-cve-2024-45195</loc>
<lastmod>2026-05-17T02:01:21.776996+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-whatsup-gold-sql-injection-vulnerability-cve-2024-6670</loc>
<lastmod>2026-05-17T02:01:54.830232+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/teamviewer-driver-privilege-escalation-cve-2024-7479-august-2024</loc>
<lastmod>2026-05-13T01:12:16.767291+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-sonicos-improper-access-control-vulnerability-cve-2024-40766</loc>
<lastmod>2026-05-17T03:31:36.987003+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/versa-director-dangerous-file-type-upload-vulnerability-cve-2024-39717</loc>
<lastmod>2026-05-17T02:03:06.847647+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-hardcoded-credential-vulnerability-cve-2024-28987</loc>
<lastmod>2026-05-17T02:01:44.027791+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2024-7971</loc>
<lastmod>2026-05-17T02:02:17.427177+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-inappropriate-implementation-vulnerability-cve-2024-7965</loc>
<lastmod>2026-05-17T02:02:04.782825+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kingsoft-wps-office-path-traversal-vulnerability-cve-2024-7262</loc>
<lastmod>2026-05-17T02:01:23.475686+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-tcpip-ipv6-rce-cve-2024-38063-august-2024</loc>
<lastmod>2026-05-16T13:16:56.920898+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ancillary-function-driver-for-winsock-privilege-escalation-vulnerability-cve-2024-38193</loc>
<lastmod>2026-05-17T02:01:02.273841+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-project-remote-code-execution-vulnerability-cve-2024-38189</loc>
<lastmod>2026-05-17T02:02:45.262177+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-power-dependency-coordinator-privilege-escalation-vulnerability-cve-2024-38107</loc>
<lastmod>2026-05-17T02:01:24.450281+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-scripting-engine-memory-corruption-vulnerability-cve-2024-38178</loc>
<lastmod>2026-05-17T02:01:31.383318+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-virtual-traffic-manager-authentication-bypass-vulnerability-cve-2024-7593</loc>
<lastmod>2026-05-17T03:28:23.532908+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2024-38106</loc>
<lastmod>2026-05-17T02:03:02.954798+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smartscreen-security-feature-bypass-vulnerability-cve-2024-38213</loc>
<lastmod>2026-05-17T02:01:12.947115+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability-cve-2024-28986</loc>
<lastmod>2026-05-17T02:02:59.048171+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability-cve-2024-27443</loc>
<lastmod>2026-05-17T02:02:24.877671+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-magicinfo-9-server-path-traversal-vulnerability-cve-2024-7399</loc>
<lastmod>2026-05-17T02:01:25.439177+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/teamt5-threatsonar-anti-ransomware-unrestricted-upload-of-file-with-dangerous-type-vulnerability-cve-2024-7694</loc>
<lastmod>2026-05-17T02:02:38.129407+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-sip-phones-argument-injection-vulnerability-cve-2024-41710</loc>
<lastmod>2026-05-17T02:02:07.840907+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-update-stack-downdate-cve-2024-38202-october-2024</loc>
<lastmod>2026-05-16T13:16:57.627093+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-vulnerability-cve-2024-42009</loc>
<lastmod>2026-05-17T02:02:25.743976+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-ofbiz-incorrect-authorization-vulnerability-cve-2024-38856</loc>
<lastmod>2026-05-17T02:01:48.565158+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/acronis-cyber-infrastructure-aci-insecure-default-password-vulnerability-cve-2023-45249</loc>
<lastmod>2026-05-17T02:02:17.164843+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/servicenow-incomplete-list-of-disallowed-inputs-vulnerability-cve-2024-5217</loc>
<lastmod>2026-05-17T02:00:57.538847+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-expedition-missing-authentication-vulnerability-cve-2024-5910</loc>
<lastmod>2026-05-17T03:30:38.80983+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/servicenow-improper-input-validation-vulnerability-cve-2024-4879</loc>
<lastmod>2026-05-17T02:02:50.980607+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-rdls-rce-cve-2024-38077-july-2024</loc>
<lastmod>2026-05-16T13:16:56.121432+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-2022-cumulative-update-kb5040442-july-2024</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-hyper-v-privilege-escalation-vulnerability-cve-2024-38080</loc>
<lastmod>2026-05-17T02:02:17.948929+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-spoofing-vulnerability-cve-2024-38112</loc>
<lastmod>2026-05-17T02:01:15.481887+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-deserialization-vulnerability-cve-2024-38094</loc>
<lastmod>2026-05-17T02:01:45.507881+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/twilio-authy-information-disclosure-vulnerability-cve-2024-39891</loc>
<lastmod>2026-05-17T02:00:58.420038+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openssh-unauthenticated-rce-cve-2024-6387-july-2024</loc>
<lastmod>2026-05-13T01:12:15.7694+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-nx-os-command-injection-vulnerability-cve-2024-20399</loc>
<lastmod>2026-05-17T02:02:49.427347+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/osgeo-geoserver-geotools-eval-injection-vulnerability-cve-2024-36401</loc>
<lastmod>2026-05-17T02:03:03.769795+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-improper-escaping-of-output-vulnerability-cve-2024-38475</loc>
<lastmod>2026-05-17T02:02:28.630313+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-authentication-bypass-vulnerability-cve-2024-37085</loc>
<lastmod>2026-05-17T02:01:39.000988+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-whatsup-gold-path-traversal-vulnerability-cve-2024-4885</loc>
<lastmod>2026-05-17T02:01:24.733415+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/broadcom-vmware-vcenter-server-out-of-bounds-write-vulnerability-cve-2024-37079</loc>
<lastmod>2026-05-17T02:02:20.030891+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/geovision-devices-os-command-injection-vulnerability-cve-2024-6047</loc>
<lastmod>2026-05-17T02:02:41.879008+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-commerce-and-magento-open-source-improper-restriction-of-xml-external-entity-reference-xxe-vul-cve-2024-34102</loc>
<lastmod>2026-05-17T02:01:43.759293+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-pixel-privilege-escalation-vulnerability-cve-2024-32896</loc>
<lastmod>2026-05-17T02:03:08.421006+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-msmq-rce-cve-2024-30080-june-2024</loc>
<lastmod>2026-05-16T13:16:56.749368+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-mode-driver-untrusted-pointer-dereference-vulnerability-cve-2024-35250</loc>
<lastmod>2026-05-17T02:01:46.90158+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-toctou-race-condition-vulnerability-cve-2024-30088</loc>
<lastmod>2026-05-17T02:01:59.634701+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-kernel-remote-code-execution-vulnerability-cve-2024-36971</loc>
<lastmod>2026-05-17T03:27:31.385806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/php-cgi-os-command-injection-vulnerability-cve-2024-4577</loc>
<lastmod>2026-05-17T02:02:37.77894+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-mali-gpu-kernel-driver-use-after-free-vulnerability-cve-2024-4610</loc>
<lastmod>2026-05-17T03:57:00.342503+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-xss-vulnerability-cve-2024-37383</loc>
<lastmod>2026-05-17T02:01:30.040642+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-serv-u-path-traversal-vulnerability-cve-2024-28995</loc>
<lastmod>2026-05-17T02:02:28.281371+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-epm-sql-injection-vulnerability-cve-2024-29824</loc>
<lastmod>2026-05-17T03:56:53.220127+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rejetto-http-file-server-improper-neutralization-of-special-elements-used-in-a-template-engine-vulne-cve-2024-23692</loc>
<lastmod>2026-05-17T02:01:57.974713+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-telerik-report-server-authentication-bypass-by-spoofing-vulnerability-cve-2024-4358</loc>
<lastmod>2026-05-17T02:02:26.616769+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/check-point-quantum-security-gateways-information-disclosure-vulnerability-cve-2024-24919</loc>
<lastmod>2026-05-17T02:02:21.75979+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2024-5274</loc>
<lastmod>2026-05-17T02:02:37.864726+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/justice-av-solutions-javs-viewer-installer-embedded-malicious-code-vulnerability-cve-2024-4978</loc>
<lastmod>2026-05-17T02:02:29.142285+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2024-4947</loc>
<lastmod>2026-05-17T02:01:31.56838+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-out-of-bounds-memory-write-vulnerability-cve-2024-4761</loc>
<lastmod>2026-05-17T02:01:00.641422+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/git-clone-rce-windows-cve-2024-32002-may-2024</loc>
<lastmod>2026-05-13T01:12:16.203241+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-dwm-core-library-privilege-escalation-vulnerability-cve-2024-30051</loc>
<lastmod>2026-05-17T02:01:12.40972+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-security-feature-bypass-vulnerability-cve-2024-30040</loc>
<lastmod>2026-05-17T02:01:49.25907+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/edge-chromium-use-after-free-cve-2024-4671-may-2024</loc>
<lastmod>2026-05-16T03:06:38.926984+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-ofbiz-path-traversal-vulnerability-cve-2024-32113</loc>
<lastmod>2026-05-17T02:01:28.425723+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tp-link-tl-wr841n-authentication-bypass-by-spoofing-vulnerability-cve-2023-50224</loc>
<lastmod>2026-05-17T03:30:37.341068+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-privilege-escalation-vulnerability-cve-2024-20359</loc>
<lastmod>2026-05-17T02:02:37.949492+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-asa-and-ftd-denial-of-service-vulnerability-cve-2024-20353</loc>
<lastmod>2026-05-17T02:01:58.059794+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/crushftp-vfs-sandbox-escape-vulnerability-cve-2024-4040</loc>
<lastmod>2026-05-17T02:01:06.057327+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-hugegraph-server-improper-access-control-vulnerability-cve-2024-27348</loc>
<lastmod>2026-05-17T02:01:59.724173+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/java-jdk-dos-cve-2024-21011-april-2024</loc>
<lastmod>2026-05-13T01:12:15.439901+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/winscp-sftp-client-security-update-6-3-3</loc>
<lastmod>2026-05-13T01:12:17.302582+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/putty-private-key-recovery-cve-2024-31497-april-2024</loc>
<lastmod>2026-05-13T01:12:16.97897+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-globalprotect-rce-cve-2024-3400-april-2024</loc>
<lastmod>2026-05-15T23:21:50.171066+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nodejs-cmd-injection-cve-2024-27980-april-2024</loc>
<lastmod>2026-05-13T01:12:15.984689+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-csc-service-eop-cve-2024-26229-april-2024</loc>
<lastmod>2026-05-16T13:16:57.783773+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5036896-april-2024</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-smartscreen-prompt-security-feature-bypass-vulnerability-cve-2024-29988</loc>
<lastmod>2026-05-17T02:02:27.924735+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-pixel-information-disclosure-vulnerability-cve-2024-29745</loc>
<lastmod>2026-05-17T02:02:11.548058+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-pixel-privilege-escalation-vulnerability-cve-2024-29748</loc>
<lastmod>2026-05-17T02:01:18.895593+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-multiple-nas-devices-command-injection-vulnerability-cve-2024-3273</loc>
<lastmod>2026-05-17T03:30:29.818925+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-multiple-nas-devices-use-of-hard-coded-credentials-vulnerability-cve-2024-3272</loc>
<lastmod>2026-05-17T03:31:22.944239+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-net-framework-information-disclosure-vulnerability-cve-2024-29059</loc>
<lastmod>2026-05-17T02:01:31.909092+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/firefox-out-of-bounds-rce-cve-2024-29943-march-2024</loc>
<lastmod>2026-05-13T01:12:15.220511+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/python-zipimport-path-traversal-cve-2024-0450-march-2024</loc>
<lastmod>2026-05-13T01:12:15.660512+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-improper-access-control-vulnerability-cve-2024-20767</loc>
<lastmod>2026-05-17T02:02:21.929456+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-tomcat-http2-dos-cve-2024-24549-march-2024</loc>
<lastmod>2026-05-13T01:12:15.87971+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-forticlient-ems-sql-injection-vulnerability-cve-2023-48788</loc>
<lastmod>2026-05-17T03:27:17.335608+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-error-reporting-service-improper-privilege-management-vulnerability-cve-2024-26169</loc>
<lastmod>2026-05-17T02:03:10.971393+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-memory-corruption-vulnerability-cve-2024-23296</loc>
<lastmod>2026-05-17T03:27:31.731678+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-memory-corruption-vulnerability-cve-2024-23225</loc>
<lastmod>2026-05-17T03:56:24.693157+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jetbrains-teamcity-authentication-bypass-vulnerability-cve-2024-27198</loc>
<lastmod>2026-05-17T02:01:13.305763+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jetbrains-teamcity-relative-path-traversal-vulnerability-cve-2024-27199</loc>
<lastmod>2026-05-17T02:01:45.961094+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/connectwise-screenconnect-path-traversal-vulnerability-cve-2024-1708</loc>
<lastmod>2026-05-17T02:02:24.020248+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/connectwise-screenconnect-authentication-bypass-vulnerability-cve-2024-1709</loc>
<lastmod>2026-05-17T02:01:32.182842+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-kemp-loadmaster-os-command-injection-vulnerability-cve-2024-1212</loc>
<lastmod>2026-05-17T02:02:46.806697+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-agile-product-lifecycle-management-plm-deserialization-vulnerability-cve-2024-20953</loc>
<lastmod>2026-05-17T02:03:11.237666+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-multiple-products-format-string-vulnerability-cve-2024-23113</loc>
<lastmod>2026-05-17T03:28:07.450163+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-internet-shortcut-files-security-feature-bypass-vulnerability-cve-2024-21412</loc>
<lastmod>2026-05-17T02:01:00.285129+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smartscreen-security-feature-bypass-vulnerability-cve-2024-21351</loc>
<lastmod>2026-05-17T02:01:04.662808+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoom-desktop-improper-input-rce-cve-2024-24691-february-2024</loc>
<lastmod>2026-05-13T01:12:16.649075+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-privilege-escalation-vulnerability-cve-2024-21410</loc>
<lastmod>2026-05-17T02:02:30.890899+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-outlook-improper-input-validation-vulnerability-cve-2024-21413</loc>
<lastmod>2026-05-17T02:02:50.893124+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-exposed-ioctl-with-insufficient-access-control-vulnerability-cve-2024-21338</loc>
<lastmod>2026-05-17T02:02:58.442466+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortios-out-of-bounds-write-cve-2024-21762-february-2024</loc>
<lastmod>2026-05-15T23:22:12.797353+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-use-after-free-vulnerability-cve-2024-1086</loc>
<lastmod>2026-05-17T03:29:47.836691+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-connect-secure-policy-secure-and-neurons-server-side-request-forgery-ssrf-vulnerability-cve-2024-21893</loc>
<lastmod>2026-05-17T03:28:10.430323+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jenkins-command-line-interface-cli-path-traversal-vulnerability-cve-2024-23897</loc>
<lastmod>2026-05-17T02:01:48.386532+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-type-confusion-vulnerability-cve-2024-23222</loc>
<lastmod>2026-05-17T03:30:13.233529+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dir-859-router-path-traversal-vulnerability-cve-2024-0769</loc>
<lastmod>2026-05-17T03:30:39.620261+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-netscaler-adc-and-netscaler-gateway-code-injection-vulnerability-cve-2023-6548</loc>
<lastmod>2026-05-17T03:27:31.19174+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-netscaler-adc-and-netscaler-gateway-buffer-overflow-vulnerability-cve-2023-6549</loc>
<lastmod>2026-05-17T03:56:15.329688+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-data-center-and-server-template-injection-vulnerability-cve-2023-22527</loc>
<lastmod>2026-05-17T02:01:40.149015+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gitlab-community-and-enterprise-editions-improper-access-control-vulnerability-cve-2023-7028</loc>
<lastmod>2026-05-17T02:01:29.677467+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-connect-secure-rce-cve-2024-21887-january-2024</loc>
<lastmod>2026-05-15T23:22:42.47434+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-and-ipados-use-after-free-vulnerability-cve-2023-41974</loc>
<lastmod>2026-05-17T02:02:34.994632+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5034441-january-2024</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-memory-corruption-vulnerability-cve-2022-48618</loc>
<lastmod>2026-05-17T03:27:46.497031+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-use-after-free-vulnerability-cve-2022-2586</loc>
<lastmod>2026-05-17T03:31:28.361043+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/spreadsheetparseexcel-remote-code-execution-vulnerability-cve-2023-7101</loc>
<lastmod>2026-05-17T02:02:28.886754+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-viostor-nvr-os-command-injection-vulnerability-cve-2023-47565</loc>
<lastmod>2026-05-17T02:02:55.041723+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fxc-ae1021-ae1021pe-os-command-injection-vulnerability-cve-2023-49897</loc>
<lastmod>2026-05-17T02:02:04.867039+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-use-of-out-of-range-pointer-offset-vulnerability-cve-2023-33106</loc>
<lastmod>2026-05-17T03:56:32.74893+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-use-after-free-vulnerability-cve-2023-33063</loc>
<lastmod>2026-05-17T03:28:24.370556+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-integer-overflow-vulnerability-cve-2023-33107</loc>
<lastmod>2026-05-17T03:30:07.415652+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-sma100-appliances-os-command-injection-vulnerability-cve-2023-44221</loc>
<lastmod>2026-05-17T03:31:36.106303+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/unitronics-vision-plc-and-hmi-insecure-default-password-vulnerability-cve-2023-6448</loc>
<lastmod>2026-05-17T02:02:55.216165+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-out-of-bounds-read-vulnerability-cve-2023-42916</loc>
<lastmod>2026-05-17T02:01:00.468472+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-memory-corruption-vulnerability-cve-2023-42917</loc>
<lastmod>2026-05-17T03:29:45.725531+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/owncloud-graphapi-information-disclosure-vulnerability-cve-2023-49103</loc>
<lastmod>2026-05-17T02:02:45.520151+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qlik-sense-http-tunneling-vulnerability-cve-2023-48365</loc>
<lastmod>2026-05-17T02:03:06.247097+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-cloud-files-mini-filter-driver-privilege-escalation-vulnerability-cve-2023-36036</loc>
<lastmod>2026-05-17T02:01:07.736314+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-out-of-bounds-read-vulnerability-cve-2023-36424</loc>
<lastmod>2026-05-17T02:02:06.009111+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smartscreen-security-feature-bypass-vulnerability-cve-2023-36025</loc>
<lastmod>2026-05-17T02:02:40.488844+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-desktop-window-manager-dwm-core-library-privilege-escalation-vulnerability-cve-2023-36033</loc>
<lastmod>2026-05-17T02:02:09.469056+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sysaid-server-path-traversal-vulnerability-cve-2023-47246</loc>
<lastmod>2026-05-17T02:02:56.772683+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-data-center-and-server-improper-authorization-vulnerability-cve-2023-22518</loc>
<lastmod>2026-05-17T02:01:10.832206+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-activemq-deserialization-of-untrusted-data-vulnerability-cve-2023-46604</loc>
<lastmod>2026-05-17T02:02:31.063076+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/f5-bigip-auth-bypass-rce-cve-2023-46747-october-2023</loc>
<lastmod>2026-05-13T01:12:17.193706+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nextgen-healthcare-mirth-connect-deserialization-of-untrusted-data-vulnerability-cve-2023-43208</loc>
<lastmod>2026-05-17T02:02:05.298901+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/f5-big-ip-configuration-utility-sql-injection-vulnerability-cve-2023-46748</loc>
<lastmod>2026-05-17T03:30:17.214331+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-out-of-bounds-write-vulnerability-cve-2023-34048</loc>
<lastmod>2026-05-17T02:02:51.065541+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-ios-xe-webui-command-injection-cve-2023-20273-october-2023</loc>
<lastmod>2026-05-13T01:12:17.086465+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/north-grid-proself-improper-restriction-of-xml-external-entity-xxe-reference-vulnerability-cve-2023-45727</loc>
<lastmod>2026-05-17T02:01:05.419311+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-persistent-cross-site-scripting-xss-vulnerability-cve-2023-5631</loc>
<lastmod>2026-05-17T02:01:14.568714+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/java-tls-dos-cve-2023-22081-october-2023</loc>
<lastmod>2026-05-13T01:12:15.550291+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-ios-xe-privilege-escalation-cve-2023-20198-october-2023</loc>
<lastmod>2026-05-15T23:22:52.544014+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability-cve-2023-36584</loc>
<lastmod>2026-05-17T02:01:23.11888+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-netscaler-adc-and-netscaler-gateway-buffer-overflow-vulnerability-cve-2023-4966</loc>
<lastmod>2026-05-17T03:28:09.871508+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-wordpad-information-disclosure-vulnerability-cve-2023-36563</loc>
<lastmod>2026-05-17T02:02:45.430273+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-skype-for-business-privilege-escalation-vulnerability-cve-2023-41763</loc>
<lastmod>2026-05-17T02:01:14.201434+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-and-ipados-kernel-privilege-escalation-vulnerability-cve-2023-42824</loc>
<lastmod>2026-05-17T03:31:02.839535+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-data-center-and-server-broken-access-control-vulnerability-cve-2023-22515</loc>
<lastmod>2026-05-17T02:01:47.691625+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gnu-c-library-buffer-overflow-vulnerability-cve-2023-4911</loc>
<lastmod>2026-05-17T02:02:43.976126+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-mali-gpu-kernel-driver-use-after-free-vulnerability-cve-2023-4211</loc>
<lastmod>2026-05-17T03:28:15.151817+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-libvpx-heap-buffer-overflow-vulnerability-cve-2023-5217</loc>
<lastmod>2026-05-17T02:01:37.936245+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/progress-wsftp-server-deserialization-of-untrusted-data-vulnerability-cve-2023-40044</loc>
<lastmod>2026-05-17T02:01:42.600789+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/juniper-junos-os-srx-series-missing-authentication-for-critical-function-vulnerability-cve-2023-36851</loc>
<lastmod>2026-05-17T02:01:05.510868+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-ios-and-ios-xe-group-encrypted-transport-vpn-out-of-bounds-write-vulnerability-cve-2023-20109</loc>
<lastmod>2026-05-17T03:56:47.645204+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-persistent-cross-site-scripting-xss-vulnerability-cve-2023-43770</loc>
<lastmod>2026-05-17T02:01:17.906341+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-kernel-privilege-escalation-vulnerability-cve-2023-41992</loc>
<lastmod>2026-05-17T03:57:25.558851+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-code-execution-vulnerability-cve-2023-41993</loc>
<lastmod>2026-05-17T02:00:56.935566+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-improper-certificate-validation-vulnerability-cve-2023-41991</loc>
<lastmod>2026-05-17T03:56:23.257458+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/jetbrains-teamcity-authentication-bypass-vulnerability-cve-2023-42793</loc>
<lastmod>2026-05-17T02:02:26.70334+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-one-and-worry-free-business-security-remote-code-execution-vulnerability-cve-2023-41179</loc>
<lastmod>2026-05-17T02:02:21.501985+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-improper-access-control-vulnerability-cve-2023-38205</loc>
<lastmod>2026-05-17T02:01:44.9008+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-out-of-bounds-write-vulnerability-cve-2023-26369</loc>
<lastmod>2026-05-17T02:02:07.927695+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-2022-http2-rapid-reset-kb5030214-september-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-word-information-disclosure-vulnerability-cve-2023-36761</loc>
<lastmod>2026-05-17T02:02:54.040394+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-code-execution-vulnerability-cve-2023-41990</loc>
<lastmod>2026-05-17T03:56:50.421825+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-streaming-service-proxy-privilege-escalation-vulnerability-cve-2023-36802</loc>
<lastmod>2026-05-17T02:02:05.925121+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-privilege-escalation-vulnerability-cve-2023-35674</loc>
<lastmod>2026-05-17T02:01:12.594238+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/asus-rt-ax55-routers-os-command-injection-vulnerability-cve-2023-39780</loc>
<lastmod>2026-05-17T03:29:55.64336+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-imageio-buffer-overflow-vulnerability-cve-2023-41064</loc>
<lastmod>2026-05-17T03:27:21.883071+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-watchos-wallet-code-execution-vulnerability-cve-2023-41061</loc>
<lastmod>2026-05-17T03:27:25.084138+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-adaptive-security-appliance-and-firepower-threat-defense-unauthorized-access-vulnerability-cve-2023-20269</loc>
<lastmod>2026-05-17T02:01:02.368235+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2023-4762</loc>
<lastmod>2026-05-17T02:02:45.772427+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qlik-sense-http-tunneling-vulnerability-cve-2023-41265</loc>
<lastmod>2026-05-17T02:02:05.12842+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qlik-sense-path-traversal-vulnerability-cve-2023-41266</loc>
<lastmod>2026-05-17T02:02:09.033561+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rarlab-winrar-code-execution-vulnerability-cve-2023-38831</loc>
<lastmod>2026-05-17T02:02:50.381111+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-sentry-authentication-bypass-vulnerability-cve-2023-38035</loc>
<lastmod>2026-05-17T03:27:17.804863+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/winrar-out-of-bounds-write-rce-cve-2023-40477-august-2023</loc>
<lastmod>2026-05-13T01:12:16.872938+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/juniper-junos-os-srx-series-missing-authentication-for-critical-function-vulnerability-cve-2023-36846</loc>
<lastmod>2026-05-17T03:56:08.177258+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/juniper-junos-os-ex-series-missing-authentication-for-critical-function-vulnerability-cve-2023-36847</loc>
<lastmod>2026-05-17T03:28:14.465941+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/juniper-junos-os-ex-series-and-srx-series-php-external-variable-modification-vulnerability-cve-2023-36845</loc>
<lastmod>2026-05-17T03:28:17.601626+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/juniper-junos-os-ex-series-php-external-variable-modification-vulnerability-cve-2023-36844</loc>
<lastmod>2026-05-17T03:29:56.391462+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-and-mobileiron-core-authentication-bypass-vulnerability-cve-2023-35082</loc>
<lastmod>2026-05-17T03:31:40.557616+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-unspecified-vulnerability-cve-2022-48503</loc>
<lastmod>2026-05-17T03:57:01.094302+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-net-core-and-visual-studio-denial-of-service-vulnerability-cve-2023-38180</loc>
<lastmod>2026-05-17T02:02:42.226607+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-epmm-path-traversal-vulnerability-cve-2023-35081</loc>
<lastmod>2026-05-17T03:30:52.186489+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zkteco-biotime-path-traversal-vulnerability-cve-2023-38950</loc>
<lastmod>2026-05-17T02:02:38.661033+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability-cve-2023-37580</loc>
<lastmod>2026-05-17T02:02:22.276617+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-kernel-unspecified-vulnerability-cve-2023-38606</loc>
<lastmod>2026-05-17T03:56:35.488707+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-code-execution-vulnerability-cve-2023-37450</loc>
<lastmod>2026-05-17T03:30:22.432842+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-mobile-authentication-bypass-vulnerability-cve-2023-35078</loc>
<lastmod>2026-05-17T03:56:22.566289+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2023-38203</loc>
<lastmod>2026-05-17T02:01:45.330366+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-adc-gateway-rce-cve-2023-3519-july-2023</loc>
<lastmod>2026-05-15T23:22:23.242653+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2023-29300</loc>
<lastmod>2026-05-17T02:02:15.182665+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-improper-access-control-vulnerability-cve-2023-29298</loc>
<lastmod>2026-05-17T02:02:07.053952+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5028997-july-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-privilege-escalation-vulnerability-cve-2023-32046</loc>
<lastmod>2026-05-17T02:02:31.341677+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-outlook-security-feature-bypass-vulnerability-cve-2023-35311</loc>
<lastmod>2026-05-17T02:02:01.484784+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-error-reporting-service-privilege-escalation-vulnerability-cve-2023-36874</loc>
<lastmod>2026-05-17T02:02:16.127277+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-defender-smartscreen-security-feature-bypass-vulnerability-cve-2023-32049</loc>
<lastmod>2026-05-17T02:01:17.625757+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-search-remote-code-execution-vulnerability-cve-2023-36884</loc>
<lastmod>2026-05-17T02:02:19.175833+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-content-collaboration-sharefile-improper-access-control-vulnerability-cve-2023-24489</loc>
<lastmod>2026-05-17T03:30:30.900784+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability-cve-2023-34192</loc>
<lastmod>2026-05-17T02:02:30.715496+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-pixel-information-disclosure-vulnerability-cve-2023-21237</loc>
<lastmod>2026-05-17T02:03:04.483982+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-memory-corruption-vulnerability-cve-2023-32435</loc>
<lastmod>2026-05-17T03:27:12.45155+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-out-of-bounds-read-vulnerability-cve-2023-28204</loc>
<lastmod>2026-05-17T03:31:02.641356+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-type-confusion-vulnerability-cve-2023-32439</loc>
<lastmod>2026-05-17T03:29:43.290778+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-use-after-free-vulnerability-cve-2023-32373</loc>
<lastmod>2026-05-17T03:28:21.979067+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-sandbox-escape-vulnerability-cve-2023-32409</loc>
<lastmod>2026-05-17T03:56:36.208511+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-integer-overflow-vulnerability-cve-2023-32434</loc>
<lastmod>2026-05-17T03:56:58.327239+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/papercut-ngmf-cross-site-request-forgery-csrf-vulnerability-cve-2023-2533</loc>
<lastmod>2026-05-17T02:02:21.845123+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-multiple-nas-devices-command-injection-vulnerability-cve-2023-27992</loc>
<lastmod>2026-05-17T03:31:00.456066+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-streaming-service-untrusted-pointer-dereference-vulnerability-cve-2023-29360</loc>
<lastmod>2026-05-17T02:02:53.857083+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-server-privilege-escalation-vulnerability-cve-2023-29357</loc>
<lastmod>2026-05-17T02:02:05.476025+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-tools-authentication-bypass-vulnerability-cve-2023-20867</loc>
<lastmod>2026-05-17T02:03:12.462664+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortigate-ssl-vpn-heap-overflow-cve-2023-27997-june-2023</loc>
<lastmod>2026-05-15T23:22:01.190457+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tp-link-multiple-routers-command-injection-vulnerability-cve-2023-33538</loc>
<lastmod>2026-05-17T03:27:47.744205+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-aria-operations-for-networks-command-injection-vulnerability-cve-2023-20887</loc>
<lastmod>2026-05-17T02:01:59.288101+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2023-3079</loc>
<lastmod>2026-05-17T02:01:54.219812+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/moveit-transfer-sql-injection-rce-cve-2023-34362-june-2023</loc>
<lastmod>2026-05-13T01:12:16.308473+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ignite-realtime-openfire-path-traversal-vulnerability-cve-2023-32315</loc>
<lastmod>2026-05-17T02:02:32.476566+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/barracuda-networks-esg-appliance-improper-input-validation-vulnerability-cve-2023-2868</loc>
<lastmod>2026-05-17T02:01:13.219457+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-multiple-firewalls-buffer-overflow-vulnerability-cve-2023-33009</loc>
<lastmod>2026-05-17T03:28:22.204605+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-multiple-firewalls-buffer-overflow-vulnerability-cve-2023-33010</loc>
<lastmod>2026-05-17T03:57:04.679011+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-rocketmq-command-execution-vulnerability-cve-2023-33246</loc>
<lastmod>2026-05-17T02:01:38.911646+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2023-29336</loc>
<lastmod>2026-05-17T02:00:58.317329+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-sharepoint-server-code-injection-vulnerability-cve-2023-24955</loc>
<lastmod>2026-05-17T02:02:19.521339+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-insertion-of-sensitive-information-into-log-file-vulnerability-cve-2023-21492</loc>
<lastmod>2026-05-17T03:56:45.458842+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-multiple-firewalls-os-command-injection-vulnerability-cve-2023-28771</loc>
<lastmod>2026-05-17T03:27:42.321459+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/service-location-protocol-slp-denial-of-service-vulnerability-cve-2023-29552</loc>
<lastmod>2026-05-17T02:03:01.79909+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-superset-insecure-default-initialization-of-resource-vulnerability-cve-2023-27524</loc>
<lastmod>2026-05-17T02:00:59.828138+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/papercut-ngmf-improper-authentication-vulnerability-cve-2023-27351</loc>
<lastmod>2026-05-17T02:01:53.615439+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/papercut-mfng-improper-access-control-vulnerability-cve-2023-27350</loc>
<lastmod>2026-05-17T02:02:55.387164+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-skia-integer-overflow-vulnerability-cve-2023-2136</loc>
<lastmod>2026-05-17T02:02:09.552961+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2023-2033</loc>
<lastmod>2026-05-17T02:00:59.923164+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-command-injection-vulnerability-cve-2023-20118</loc>
<lastmod>2026-05-17T02:02:32.922162+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5025229-april-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-cng-key-isolation-service-privilege-escalation-vulnerability-cve-2023-28229</loc>
<lastmod>2026-05-17T02:01:32.268384+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability-cve-2023-28252</loc>
<lastmod>2026-05-17T02:01:36.450456+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/novi-survey-insecure-deserialization-vulnerability-cve-2023-29492</loc>
<lastmod>2026-05-17T02:02:45.603576+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-iosurfaceaccelerator-out-of-bounds-write-vulnerability-cve-2023-28206</loc>
<lastmod>2026-05-17T03:27:38.368179+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-use-after-free-vulnerability-cve-2023-28205</loc>
<lastmod>2026-05-17T03:28:14.056405+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-mali-gpu-kernel-driver-information-disclosure-vulnerability-cve-2023-26083</loc>
<lastmod>2026-05-17T03:27:34.14999+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sophos-web-appliance-command-injection-vulnerability-cve-2023-1671</loc>
<lastmod>2026-05-17T02:02:14.654658+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/hitachi-vantara-pentaho-ba-server-authorization-bypass-vulnerability-cve-2022-43939</loc>
<lastmod>2026-05-17T02:01:15.755136+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/hitachi-vantara-pentaho-ba-server-special-element-injection-vulnerability-cve-2022-43769</loc>
<lastmod>2026-05-17T02:01:51.416474+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-framework-privilege-escalation-vulnerability-cve-2023-20963</loc>
<lastmod>2026-05-17T02:02:13.880402+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortra-cobalt-strike-user-interface-remote-code-execution-vulnerability-cve-2022-42948</loc>
<lastmod>2026-05-17T02:02:18.828036+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2023-26359</loc>
<lastmod>2026-05-17T02:01:50.29869+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-coldfusion-deserialization-of-untrusted-data-vulnerability-cve-2023-26360</loc>
<lastmod>2026-05-17T02:01:12.684448+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-improper-ownership-management-vulnerability-cve-2023-0386</loc>
<lastmod>2026-05-17T03:57:27.615561+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/minio-security-feature-bypass-vulnerability-cve-2023-28434</loc>
<lastmod>2026-05-17T02:01:34.41896+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/minio-information-disclosure-vulnerability-cve-2023-28432</loc>
<lastmod>2026-05-17T02:02:00.780448+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dir-820-router-os-command-injection-vulnerability-cve-2023-25280</loc>
<lastmod>2026-05-17T03:56:11.703369+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tp-link-archer-ax-21-command-injection-vulnerability-cve-2023-1389</loc>
<lastmod>2026-05-17T03:27:17.596718+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/array-networks-ag-and-vxag-arrayos-missing-authentication-for-critical-function-vulnerability-cve-2023-28461</loc>
<lastmod>2026-05-17T02:02:06.884863+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2019-2022-cumulative-update-kb5023706-march-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-smartscreen-security-feature-bypass-vulnerability-cve-2023-24880</loc>
<lastmod>2026-05-17T02:02:23.226987+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/outlook-ntlm-credential-theft-kb5023745-march-2023</loc>
<lastmod>2026-05-16T03:06:35.838816+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veeam-backup-replication-cloud-connect-missing-authentication-for-critical-function-vulnerability-cve-2023-27532</loc>
<lastmod>2026-05-17T02:01:27.880812+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortios-path-traversal-vulnerability-cve-2022-41328</loc>
<lastmod>2026-05-17T03:56:19.572937+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/webkitgtk-memory-corruption-vulnerability-cve-2019-8720</loc>
<lastmod>2026-05-17T02:01:06.994242+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-type-confusion-vulnerability-cve-2023-23529</loc>
<lastmod>2026-05-17T03:27:21.042403+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ibm-aspera-faspex-code-execution-vulnerability-cve-2022-47986</loc>
<lastmod>2026-05-17T02:02:41.536147+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/joomla-improper-access-control-vulnerability-cve-2023-23752</loc>
<lastmod>2026-05-17T02:01:00.734978+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5022842-february-2023</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/word-rtf-heap-corruption-rce-cve-2023-21716-february-2023</loc>
<lastmod>2026-05-13T01:12:16.538799+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability-cve-2023-23376</loc>
<lastmod>2026-05-17T02:01:21.685007+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-publisher-security-feature-bypass-vulnerability-cve-2023-21715</loc>
<lastmod>2026-05-17T02:02:51.924522+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-deserialization-of-untrusted-data-vulnerability-cve-2023-21529</loc>
<lastmod>2026-05-17T02:03:07.618155+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-graphic-component-privilege-escalation-vulnerability-cve-2023-21823</loc>
<lastmod>2026-05-17T02:02:52.450125+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/multiple-ruckus-wireless-products-csrf-and-rce-vulnerability-cve-2023-25717</loc>
<lastmod>2026-05-17T02:02:20.468097+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/terramaster-os-remote-command-execution-vulnerability-cve-2022-24990</loc>
<lastmod>2026-05-17T02:03:06.933788+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortra-goanywhere-mft-remote-code-execution-vulnerability-cve-2023-0669</loc>
<lastmod>2026-05-17T02:02:12.572441+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-use-after-free-vulnerability-cve-2023-0266</loc>
<lastmod>2026-05-17T03:27:28.447019+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-use-after-free-vulnerability-cve-2023-21608</loc>
<lastmod>2026-05-17T02:01:40.680009+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-unspecified-vulnerability-cve-2023-21839</loc>
<lastmod>2026-05-17T02:02:48.371814+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-multiple-products-remote-code-execution-vulnerability-cve-2022-47966</loc>
<lastmod>2026-05-17T02:01:30.484975+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/multiple-sugarcrm-products-remote-code-execution-vulnerability-cve-2023-22952</loc>
<lastmod>2026-05-17T02:01:45.684251+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dotnet-framework-elevation-kb5022143-january-2023</loc>
<lastmod>2026-05-13T01:12:14.157509+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-advanced-local-procedure-call-alpc-privilege-escalation-vulnerability-cve-2023-21674</loc>
<lastmod>2026-05-17T02:01:28.693556+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cwp-control-web-panel-os-command-injection-vulnerability-cve-2022-44877</loc>
<lastmod>2026-05-17T02:02:13.695163+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortios-heap-based-buffer-overflow-vulnerability-cve-2022-42475</loc>
<lastmod>2026-05-17T03:56:42.649316+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-use-after-free-vulnerability-cve-2022-26485</loc>
<lastmod>2026-05-17T02:01:23.827352+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mozilla-firefox-use-after-free-vulnerability-cve-2022-26486</loc>
<lastmod>2026-05-17T02:02:51.837964+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-type-confusion-vulnerability-cve-2022-42856</loc>
<lastmod>2026-05-17T03:29:49.193543+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-application-delivery-controller-adc-and-gateway-authentication-bypass-vulnerability-cve-2022-27518</loc>
<lastmod>2026-05-17T03:31:06.900008+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-defender-smartscreen-security-feature-bypass-vulnerability-cve-2022-44698</loc>
<lastmod>2026-05-17T02:01:24.001904+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cacti-command-injection-vulnerability-cve-2022-46169</loc>
<lastmod>2026-05-17T02:01:23.917178+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2022-4262</loc>
<lastmod>2026-05-17T02:01:22.323876+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dnr-322l-download-of-code-without-integrity-check-vulnerability-cve-2022-40799</loc>
<lastmod>2026-05-17T03:57:08.238632+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-gpu-heap-buffer-overflow-vulnerability-cve-2022-4135</loc>
<lastmod>2026-05-17T02:02:45.688328+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-mivoice-connect-code-injection-vulnerability-cve-2022-41223</loc>
<lastmod>2026-05-17T02:01:29.866796+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-mivoice-connect-command-injection-vulnerability-cve-2022-40765</loc>
<lastmod>2026-05-17T02:02:07.229712+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dante-discovery-process-control-vulnerability-cve-2022-23748</loc>
<lastmod>2026-05-17T02:01:35.404148+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-scripting-languages-remote-code-execution-vulnerability-cve-2022-41128</loc>
<lastmod>2026-05-17T02:01:03.575672+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability-cve-2022-41049</loc>
<lastmod>2026-05-17T02:01:05.773235+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-privilege-escalation-vulnerability-cve-2022-41080</loc>
<lastmod>2026-05-17T02:01:49.522892+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-privilege-escalation-vulnerability-cve-2022-41073</loc>
<lastmod>2026-05-17T02:02:00.598008+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability-cve-2022-41091</loc>
<lastmod>2026-05-17T02:03:11.846561+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-cng-key-isolation-service-privilege-escalation-vulnerability-cve-2022-41125</loc>
<lastmod>2026-05-17T02:02:42.575712+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/netwrix-auditor-insecure-object-deserialization-vulnerability-cve-2022-31199</loc>
<lastmod>2026-05-17T02:01:26.802223+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-and-ipados-out-of-bounds-write-vulnerability-cve-2022-42827</loc>
<lastmod>2026-05-17T03:30:32.9528+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2022-3723</loc>
<lastmod>2026-05-17T02:01:03.757227+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-mali-gpu-kernel-driver-use-after-free-vulnerability-cve-2022-38181</loc>
<lastmod>2026-05-17T03:57:06.076161+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dsl-2750b-devices-command-injection-vulnerability-cve-2016-20017</loc>
<lastmod>2026-05-17T02:01:02.842558+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-multiple-products-authentication-bypass-vulnerability-cve-2022-40684</loc>
<lastmod>2026-05-17T03:27:28.290388+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-e-business-suite-unspecified-vulnerability-cve-2022-21587</loc>
<lastmod>2026-05-17T02:02:35.168152+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exchange-server-proxynotshell-rce-kb5019758-october-2022</loc>
<lastmod>2026-05-16T03:04:16.340116+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-privilege-escalation-vulnerability-cve-2022-38028</loc>
<lastmod>2026-05-17T02:01:31.296944+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-com-event-system-service-privilege-escalation-vulnerability-cve-2022-41033</loc>
<lastmod>2026-05-17T02:01:42.243718+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-sd-wan-path-traversal-vulnerability-cve-2022-20775</loc>
<lastmod>2026-05-17T02:03:10.35637+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-network-service-use-after-free-vulnerability-cve-2022-3038</loc>
<lastmod>2026-05-17T02:01:04.026374+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-arbitrary-file-upload-vulnerability-cve-2022-41352</loc>
<lastmod>2026-05-17T02:02:32.046489+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-mojo-insufficient-data-validation-vulnerability-cve-2022-3075</loc>
<lastmod>2026-05-17T02:01:32.356928+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-intents-insufficient-input-validation-vulnerability-cve-2022-2856</loc>
<lastmod>2026-05-17T02:02:01.044696+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sophos-firewall-code-injection-vulnerability-cve-2022-3236</loc>
<lastmod>2026-05-17T03:28:01.52889+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortra-cobalt-strike-teamserver-cross-site-scripting-xss-vulnerability-cve-2022-39197</loc>
<lastmod>2026-05-17T02:02:49.078348+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-remote-code-execution-vulnerability-cve-2022-32917</loc>
<lastmod>2026-05-17T03:56:56.202669+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/teclib-glpi-remote-code-execution-vulnerability-cve-2022-35914</loc>
<lastmod>2026-05-17T02:01:24.181212+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-one-and-apex-one-as-a-service-improper-validation-vulnerability-cve-2022-40139</loc>
<lastmod>2026-05-17T02:02:46.722599+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability-cve-2022-37969</loc>
<lastmod>2026-05-17T02:02:08.37817+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-photo-station-externally-controlled-reference-vulnerability-cve-2022-27593</loc>
<lastmod>2026-05-17T02:02:52.79552+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-routers-buffer-overflow-vulnerability-cve-2022-37055</loc>
<lastmod>2026-05-17T03:29:44.998416+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zk-framework-auuploader-unspecified-vulnerability-cve-2022-36537</loc>
<lastmod>2026-05-17T02:02:29.488181+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-bitbucket-server-and-data-center-command-injection-vulnerability-cve-2022-36804</loc>
<lastmod>2026-05-17T02:01:49.780009+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-and-macos-out-of-bounds-write-vulnerability-cve-2022-32893</loc>
<lastmod>2026-05-17T03:30:01.120098+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-and-macos-out-of-bounds-write-vulnerability-cve-2022-32894</loc>
<lastmod>2026-05-17T03:30:37.937523+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-authentication-bypass-vulnerability-cve-2022-37042</loc>
<lastmod>2026-05-17T02:02:55.905716+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/palo-alto-networks-pan-os-reflected-amplification-denial-of-service-vulnerability-cve-2022-0028</loc>
<lastmod>2026-05-17T03:57:09.621296+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-support-diagnostic-tool-msdt-remote-code-execution-vulnerability-cve-2022-34713</loc>
<lastmod>2026-05-17T02:02:54.39171+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/webrtc-heap-buffer-overflow-vulnerability-cve-2022-2294</loc>
<lastmod>2026-05-17T02:02:05.214452+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2022-1364</loc>
<lastmod>2026-05-17T02:01:39.091946+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2022-1096</loc>
<lastmod>2026-05-17T02:03:12.725456+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-questions-for-confluence-app-hard-coded-credentials-vulnerability-cve-2022-26138</loc>
<lastmod>2026-05-17T02:01:50.816413+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-multiple-products-remote-code-execution-vulnerability-cve-2022-35405</loc>
<lastmod>2026-05-17T02:01:16.031331+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-spark-command-injection-vulnerability-cve-2022-33891</loc>
<lastmod>2026-05-17T02:03:03.408016+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dotcms-unrestricted-upload-of-file-vulnerability-cve-2022-26352</loc>
<lastmod>2026-05-17T02:02:35.779129+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5015808-july-2022</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-client-server-runtime-subsystem-csrss-privilege-escalation-vulnerability-cve-2022-22047</loc>
<lastmod>2026-05-17T02:02:15.698999+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/office-msdt-rce-follina-kb5014699-june-2022</loc>
<lastmod>2026-05-16T03:04:18.571985+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-use-after-free-vulnerability-cve-2022-22071</loc>
<lastmod>2026-05-17T03:27:30.103252+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-server-and-data-center-remote-code-execution-vulnerability-cve-2022-26134</loc>
<lastmod>2026-05-17T02:02:45.346736+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-ios-xr-open-port-vulnerability-cve-2022-20821</loc>
<lastmod>2026-05-17T03:30:29.038606+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-macos-out-of-bounds-read-vulnerability-cve-2022-22674</loc>
<lastmod>2026-05-17T03:28:06.351312+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-macos-out-of-bounds-write-vulnerability-cve-2022-22675</loc>
<lastmod>2026-05-17T03:31:30.243866+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarview-compact-command-injection-vulnerability-cve-2022-29303</loc>
<lastmod>2026-05-17T02:01:02.177525+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-multiple-firewalls-os-command-injection-vulnerability-cve-2022-30525</loc>
<lastmod>2026-05-17T03:27:29.388543+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-active-directory-domain-services-privilege-escalation-vulnerability-cve-2022-26923</loc>
<lastmod>2026-05-17T02:02:26.961542+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-lsa-spoofing-vulnerability-cve-2022-26925</loc>
<lastmod>2026-05-17T02:01:52.461307+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rarlab-unrar-directory-traversal-vulnerability-cve-2022-30333</loc>
<lastmod>2026-05-17T02:02:08.950064+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/f5-big-ip-missing-authentication-vulnerability-cve-2022-1388</loc>
<lastmod>2026-05-17T03:28:21.803164+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mitel-mivoice-connect-data-validation-vulnerability-cve-2022-29499</loc>
<lastmod>2026-05-17T02:01:19.697139+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-couchdb-insecure-default-initialization-of-resource-vulnerability-cve-2022-24706</loc>
<lastmod>2026-05-17T02:02:42.492798+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-arbitrary-file-upload-vulnerability-cve-2022-27925</loc>
<lastmod>2026-05-17T02:01:00.924405+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability-cve-2022-27926</loc>
<lastmod>2026-05-17T02:01:13.483889+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaboration-suite-zcs-command-injection-vulnerability-cve-2022-27924</loc>
<lastmod>2026-05-17T02:02:01.131167+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-adf-faces-deserialization-of-untrusted-data-vulnerability-cve-2022-21445</loc>
<lastmod>2026-05-17T02:03:06.332756+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/wso2-multiple-products-unrestrictive-upload-of-file-vulnerability-cve-2022-29464</loc>
<lastmod>2026-05-17T02:01:46.815673+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-adselfservice-plus-remote-code-execution-vulnerability-cve-2022-28810</loc>
<lastmod>2026-05-17T02:01:38.553846+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-user-profile-service-privilege-escalation-vulnerability-cve-2022-26904</loc>
<lastmod>2026-05-17T02:02:00.419504+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-clfs-driver-privilege-escalation-vulnerability-cve-2022-24521</loc>
<lastmod>2026-05-17T02:02:46.114624+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-multiple-products-privilege-escalation-vulnerability-cve-2022-22960</loc>
<lastmod>2026-05-17T02:01:59.458707+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/osgeo-geoserver-jai-ext-code-injection-vulnerability-cve-2022-24816</loc>
<lastmod>2026-05-17T02:02:48.631594+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-workspace-one-access-and-identity-manager-server-side-template-injection-vulnerability-cve-2022-22954</loc>
<lastmod>2026-05-17T02:02:18.389566+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-animation-use-after-free-vulnerability-cve-2022-0609</loc>
<lastmod>2026-05-17T02:02:58.52924+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-tanzu-spring-cloud-function-remote-code-execution-vulnerability-cve-2022-22963</loc>
<lastmod>2026-05-17T02:02:54.306646+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/spring-framework-jdk-9-remote-code-execution-vulnerability-cve-2022-22965</loc>
<lastmod>2026-05-17T02:03:01.521042+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-apex-central-arbitrary-file-upload-vulnerability-cve-2022-26871</loc>
<lastmod>2026-05-17T02:01:21.070076+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-incorrect-default-file-permissions-vulnerability-cve-2022-22948</loc>
<lastmod>2026-05-17T02:01:41.455634+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dir-820l-remote-code-execution-vulnerability-cve-2022-26258</loc>
<lastmod>2026-05-17T03:27:29.224706+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sophos-firewall-authentication-bypass-vulnerability-cve-2022-1040</loc>
<lastmod>2026-05-17T03:28:07.222238+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-memory-corruption-vulnerability-cve-2022-22587</loc>
<lastmod>2026-05-17T03:27:20.860473+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-webkit-use-after-free-vulnerability-cve-2022-22620</loc>
<lastmod>2026-05-17T03:56:08.86585+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veeam-backup-replication-remote-code-execution-vulnerability-cve-2022-26501</loc>
<lastmod>2026-05-17T02:00:57.439232+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veeam-backup-replication-remote-code-execution-vulnerability-cve-2022-26500</loc>
<lastmod>2026-05-17T02:02:14.925074+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-pixel-out-of-bounds-write-vulnerability-cve-2021-39793</loc>
<lastmod>2026-05-17T03:28:11.139844+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openssl-infinite-loop-dos-cve-2022-0778-march-2022</loc>
<lastmod>2026-05-13T01:12:16.424231+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/micollab-mivoice-business-express-access-control-vulnerability-cve-2022-26143</loc>
<lastmod>2026-05-17T02:01:44.462815+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-privilege-escalation-vulnerability-cve-2022-0847</loc>
<lastmod>2026-05-17T03:30:10.263345+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/watchguard-firebox-and-xtm-appliances-arbitrary-code-execution-cve-2022-26318</loc>
<lastmod>2026-05-17T02:02:17.773459+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-mali-gpu-kernel-driver-unspecified-vulnerability-cve-2022-22706</loc>
<lastmod>2026-05-17T03:57:24.998264+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-spring-cloud-gateway-code-injection-vulnerability-cve-2022-22947</loc>
<lastmod>2026-05-17T02:01:06.720066+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/watchguard-firebox-and-xtm-privilege-escalation-vulnerability-cve-2022-23176</loc>
<lastmod>2026-05-17T02:01:19.610854+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/debian-specific-redis-server-lua-sandbox-escape-vulnerability-cve-2022-0543</loc>
<lastmod>2026-05-17T02:02:29.830801+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-multiple-routers-remote-code-execution-vulnerability-cve-2021-45382</loc>
<lastmod>2026-05-17T02:01:05.95917+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/red-hat-polkit-incorrect-authorization-vulnerability-cve-2021-3560</loc>
<lastmod>2026-05-17T02:02:07.57299+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-commerce-and-magento-open-source-improper-input-validation-vulnerability-cve-2022-24086</loc>
<lastmod>2026-05-17T02:02:16.040748+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-use-after-free-vulnerability-cve-2021-4102</loc>
<lastmod>2026-05-17T02:01:34.507983+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-heap-based-buffer-overflow-vulnerability-cve-2022-0185</loc>
<lastmod>2026-05-17T03:30:31.563697+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-apisix-authentication-bypass-vulnerability-cve-2022-24112</loc>
<lastmod>2026-05-17T02:02:35.083181+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20700</loc>
<lastmod>2026-05-17T02:01:09.006748+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20699</loc>
<lastmod>2026-05-17T02:02:55.818523+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20708</loc>
<lastmod>2026-05-17T02:02:25.304926+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20703</loc>
<lastmod>2026-05-17T02:02:56.339208+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability-cve-2022-20701</loc>
<lastmod>2026-05-17T02:01:47.244631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/synacor-zimbra-collaborate-suite-zcs-cross-site-scripting-vulnerability-cve-2022-24682</loc>
<lastmod>2026-05-17T02:01:09.921312+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-privilege-escalation-vulnerability-cve-2022-22718</loc>
<lastmod>2026-05-17T02:02:32.827449+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-multiple-products-http-request-smuggling-vulnerability-cve-2022-22536</loc>
<lastmod>2026-05-17T02:02:37.263018+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-runtime-remote-code-execution-vulnerability-cve-2022-21971</loc>
<lastmod>2026-05-17T02:02:59.838504+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-privilege-escalation-vulnerability-cve-2022-21999</loc>
<lastmod>2026-05-17T02:02:41.792104+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/reolink-rlc-410w-ip-camera-os-command-injection-vulnerability-cve-2021-40407</loc>
<lastmod>2026-05-17T02:01:25.795701+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/red-hat-polkit-out-of-bounds-read-and-write-vulnerability-cve-2021-4034</loc>
<lastmod>2026-05-17T02:02:14.396617+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-privilege-escalation-vulnerability-cve-2021-22600</loc>
<lastmod>2026-05-17T03:56:07.46873+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-fusion-middleware-unspecified-vulnerability-cve-2021-35587</loc>
<lastmod>2026-05-17T02:02:43.889004+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nuuo-nvrmini2-devices-missing-authentication-vulnerability-cve-2022-23227</loc>
<lastmod>2026-05-17T02:03:14.041108+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zabbix-frontend-authentication-bypass-vulnerability-cve-2022-23131</loc>
<lastmod>2026-05-17T02:01:18.802104+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zabbix-frontend-improper-access-control-vulnerability-cve-2022-23134</loc>
<lastmod>2026-05-17T02:02:53.495615+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-user-profile-service-privilege-escalation-vulnerability-cve-2022-21919</loc>
<lastmod>2026-05-17T02:03:11.412013+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2022-21882</loc>
<lastmod>2026-05-17T02:02:31.52157+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-use-after-free-vulnerability-cve-2022-22265</loc>
<lastmod>2026-05-17T03:27:34.312083+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-serv-u-improper-input-validation-vulnerability-cve-2021-35247</loc>
<lastmod>2026-05-17T02:03:13.163288+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fortinet-fortios-arbitrary-file-download-cve-2021-44168</loc>
<lastmod>2026-05-17T03:29:43.596091+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/acclaim-systems-usaherds-use-of-hard-coded-credentials-vulnerability-cve-2021-44207</loc>
<lastmod>2026-05-17T02:03:03.587874+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/omnissa-workspace-one-server-side-request-forgery-cve-2021-22054</loc>
<lastmod>2026-05-17T02:01:07.468372+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-kernel-use-after-free-vulnerability-cve-2021-1048</loc>
<lastmod>2026-05-17T02:00:59.190785+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/android-kernel-race-condition-vulnerability-cve-2021-0920</loc>
<lastmod>2026-05-17T03:29:44.276146+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-appx-installer-spoofing-vulnerability-cve-2021-43890</loc>
<lastmod>2026-05-17T02:02:19.69508+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-privilege-escalation-vulnerability-cve-2021-43226</loc>
<lastmod>2026-05-17T02:02:53.05099+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2022-cumulative-update-kb5008212-december-2021</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-log4j2-deserialization-of-untrusted-data-vulnerability-cve-2021-45046</loc>
<lastmod>2026-05-17T02:02:18.120403+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gitlab-community-and-enterprise-editions-server-side-request-forgery-ssrf-vulnerability-cve-2021-39935</loc>
<lastmod>2026-05-17T02:02:46.63708+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-desktop-central-authentication-bypass-vulnerability-cve-2021-44515</loc>
<lastmod>2026-05-17T02:02:57.461232+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/fatpipe-warp-ipvpn-and-mpvpn-configuration-upload-exploit-cve-2021-27860</loc>
<lastmod>2026-05-17T02:06:18.62487+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-endpoint-manager-cloud-service-appliance-epm-csa-code-injection-vulnerability-cve-2021-44529</loc>
<lastmod>2026-05-17T03:28:23.179766+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-sma-100-appliances-stack-based-buffer-overflow-vulnerability-cve-2021-20038</loc>
<lastmod>2026-05-17T03:30:36.690549+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/grafana-path-traversal-vulnerability-cve-2021-43798</loc>
<lastmod>2026-05-17T02:01:18.625897+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-servicedesk-plus-remote-code-execution-vulnerability-cve-2021-44077</loc>
<lastmod>2026-05-17T02:02:15.782465+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-intents-improper-input-validation-vulnerability-cve-2021-38000</loc>
<lastmod>2026-05-17T02:03:05.277215+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-memory-corruption-vulnerability-cve-2021-38003</loc>
<lastmod>2026-05-17T02:02:35.260804+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-sql-injection-vulnerability-cve-2021-44026</loc>
<lastmod>2026-05-17T02:01:33.062701+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/metabase-geojson-api-local-file-inclusion-vulnerability-cve-2021-41277</loc>
<lastmod>2026-05-17T02:01:19.337283+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-active-directory-domain-services-privilege-escalation-vulnerability-cve-2021-42278</loc>
<lastmod>2026-05-17T02:01:24.55183+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-remote-code-execution-vulnerability-cve-2021-42321</loc>
<lastmod>2026-05-17T02:03:00.37088+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-active-directory-domain-services-privilege-escalation-vulnerability-cve-2021-42287</loc>
<lastmod>2026-05-17T02:01:15.298996+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-installer-privilege-escalation-vulnerability-cve-2021-41379</loc>
<lastmod>2026-05-17T02:02:47.070349+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-excel-security-feature-bypass-cve-2021-42292</loc>
<lastmod>2026-05-17T02:01:18.981766+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sitecore-xp-remote-command-execution-vulnerability-cve-2021-42237</loc>
<lastmod>2026-05-17T02:03:14.394855+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/bqe-billquick-web-suite-sql-injection-vulnerability-cve-2021-42258</loc>
<lastmod>2026-05-17T02:01:20.257549+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-memory-corruption-vulnerability-cve-2021-30807</loc>
<lastmod>2026-05-17T03:27:43.098306+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/yealink-device-management-server-side-request-forgery-ssrf-vulnerability-cve-2021-27561</loc>
<lastmod>2026-05-17T03:30:23.280238+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/draytek-vigorconnect-path-traversal-vulnerability-cve-2021-20123</loc>
<lastmod>2026-05-17T02:01:13.938221+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-win32k-privilege-escalation-vulnerability-cve-2021-40449</loc>
<lastmod>2026-05-17T02:02:28.542738+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2021-40450</loc>
<lastmod>2026-05-17T02:01:51.75916+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2021-41357</loc>
<lastmod>2026-05-17T02:02:16.214173+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/draytek-vigorconnect-path-traversal-vulnerability-cve-2021-20124</loc>
<lastmod>2026-05-17T02:02:18.477579+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-information-disclosure-vulnerability-cve-2021-37976</loc>
<lastmod>2026-05-17T02:01:41.282159+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-indexed-db-api-use-after-free-vulnerability-cve-2021-30633</loc>
<lastmod>2026-05-17T02:02:26.788974+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-out-of-bounds-write-vulnerability-cve-2021-30632</loc>
<lastmod>2026-05-17T02:02:41.449456+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-portals-use-after-free-vulnerability-cve-2021-37973</loc>
<lastmod>2026-05-17T02:02:19.001215+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-use-after-free-vulnerability-cve-2021-37975</loc>
<lastmod>2026-05-17T02:03:12.810935+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-path-traversal-vulnerability-cve-2021-42013</loc>
<lastmod>2026-05-17T02:01:07.181329+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-improper-input-validation-vulnerability-cve-2021-25489</loc>
<lastmod>2026-05-17T03:27:21.436174+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-out-of-bounds-read-vulnerability-cve-2021-25487</loc>
<lastmod>2026-05-17T03:31:15.112944+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/grafana-authentication-bypass-vulnerability-cve-2021-39226</loc>
<lastmod>2026-05-17T02:03:02.693858+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-path-traversal-vulnerability-cve-2021-41773</loc>
<lastmod>2026-05-17T02:02:59.928373+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-sma100-appliances-os-command-injection-vulnerability-cve-2021-20035</loc>
<lastmod>2026-05-17T03:56:34.829298+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dir-605-router-information-disclosure-vulnerability-cve-2021-40655</loc>
<lastmod>2026-05-17T03:56:06.742474+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/citrix-sharefile-improper-access-control-vulnerability-cve-2021-22941</loc>
<lastmod>2026-05-17T02:00:59.649042+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-improper-access-control-cve-2021-22017</loc>
<lastmod>2026-05-17T02:02:33.005663+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/hikvision-improper-input-validation-cve-2021-36260</loc>
<lastmod>2026-05-17T02:01:39.876755+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-file-upload-rce-cve-2021-22005-september-2021</loc>
<lastmod>2026-05-13T01:12:14.99669+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/delta-electronics-dopsoft-2-improper-input-validation-vulnerability-cve-2021-38406</loc>
<lastmod>2026-05-17T02:01:43.124747+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-http-server-side-request-forgery-ssrf-cve-2021-40438</loc>
<lastmod>2026-05-17T02:02:06.629709+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability-cve-2021-38648</loc>
<lastmod>2026-05-17T02:00:58.02902+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-open-management-infrastructure-omi-remote-code-execution-vulnerability-cve-2021-38647</loc>
<lastmod>2026-05-17T02:00:58.71379+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-access-connectivity-engine-remote-code-execution-vulnerability-cve-2021-38646</loc>
<lastmod>2026-05-17T02:02:20.896+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dahua-ip-camera-authentication-bypass-vulnerability-cve-2021-33044</loc>
<lastmod>2026-05-17T02:01:37.236884+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability-cve-2021-36955</loc>
<lastmod>2026-05-17T02:02:34.74016+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-mshtml-remote-code-execution-vulnerability-cve-2021-40444</loc>
<lastmod>2026-05-17T02:02:23.841796+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dahua-ip-camera-authentication-bypass-vulnerability-cve-2021-33045</loc>
<lastmod>2026-05-17T02:01:40.853784+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability-cve-2021-38649</loc>
<lastmod>2026-05-17T02:02:17.336669+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability-cve-2021-38645</loc>
<lastmod>2026-05-17T02:02:22.363066+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sap-netweaver-unrestricted-file-upload-vulnerability-cve-2021-38163</loc>
<lastmod>2026-05-17T02:02:58.270044+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/aviatrix-controller-unrestricted-upload-of-file-cve-2021-40870</loc>
<lastmod>2026-05-17T02:01:07.829906+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-macos-unspecified-vulnerability-cve-2021-30713</loc>
<lastmod>2026-05-17T03:27:11.822654+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-webkit-use-after-free-vulnerability-cve-2021-30762</loc>
<lastmod>2026-05-17T03:29:51.384895+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-webkit-buffer-overflow-vulnerability-cve-2021-30666</loc>
<lastmod>2026-05-17T03:29:48.535365+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-integer-overflow-vulnerability-cve-2021-30663</loc>
<lastmod>2026-05-17T03:30:41.68296+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-macos-unspecified-vulnerability-cve-2021-30657</loc>
<lastmod>2026-05-17T03:27:16.988941+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-storage-use-after-free-vulnerability-cve-2021-30661</loc>
<lastmod>2026-05-17T03:28:17.397257+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-webkit-memory-corruption-vulnerability-cve-2021-30665</loc>
<lastmod>2026-05-17T03:57:21.291536+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-webkit-memory-corruption-vulnerability-cve-2021-30761</loc>
<lastmod>2026-05-17T03:57:23.410223+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-adselfservice-plus-authentication-bypass-vulnerability-cve-2021-40539</loc>
<lastmod>2026-05-17T02:01:56.390179+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-use-after-free-vulnerability-cve-2021-28550</loc>
<lastmod>2026-05-17T02:02:28.19558+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zoho-manageengine-servicedesk-authentication-bypass-vulnerability-cve-2021-37415</loc>
<lastmod>2026-05-17T02:02:49.252124+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-server-and-data-center-object-graph-navigation-language-ognl-injection-vulnerab-cve-2021-26084</loc>
<lastmod>2026-05-17T02:02:58.002567+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/october-cms-improper-authentication-cve-2021-32648</loc>
<lastmod>2026-05-17T02:01:14.747415+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-integer-overflow-or-wraparound-vulnerability-cve-2021-30952</loc>
<lastmod>2026-05-17T02:01:08.004367+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-macos-watchos-sandbox-bypass-vulnerability-cve-2021-31010</loc>
<lastmod>2026-05-17T03:27:21.218408+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-and-ipados-buffer-overflow-vulnerability-cve-2021-30983</loc>
<lastmod>2026-05-17T03:30:02.663226+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-out-of-bounds-write-vulnerability-cve-2021-30900</loc>
<lastmod>2026-05-17T03:30:30.276985+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-memory-corruption-vulnerability-cve-2021-30883</loc>
<lastmod>2026-05-17T03:27:28.663448+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-macos-use-after-free-vulnerability-cve-2021-30858</loc>
<lastmod>2026-05-17T02:00:57.932731+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-integer-overflow-vulnerability-cve-2021-30860</loc>
<lastmod>2026-05-17T03:27:42.158237+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-type-confusion-vulnerability-cve-2021-30869</loc>
<lastmod>2026-05-17T03:56:51.146314+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/xstream-remote-code-execution-vulnerability-cve-2021-39144</loc>
<lastmod>2026-05-17T02:02:38.485029+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/realtek-ap-router-sdk-buffer-overflow-vulnerability-cve-2021-35395</loc>
<lastmod>2026-05-17T02:01:21.422662+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/realtek-jungle-sdk-remote-code-execution-vulnerability-cve-2021-35394</loc>
<lastmod>2026-05-17T02:02:36.750246+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-jira-server-and-data-center-path-traversal-vulnerability-cve-2021-26086</loc>
<lastmod>2026-05-17T02:02:54.663942+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sunhillo-sureline-os-command-injection-vulnerablity-cve-2021-36380</loc>
<lastmod>2026-05-17T02:02:06.453329+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-event-tracing-privilege-escalation-vulnerability-cve-2021-34486</loc>
<lastmod>2026-05-17T02:01:01.308266+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-local-security-authority-lsa-spoofing-vulnerability-cve-2021-36942</loc>
<lastmod>2026-05-17T02:02:24.447281+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-user-profile-service-privilege-escalation-vulnerability-cve-2021-34484</loc>
<lastmod>2026-05-17T02:01:23.738631+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-update-medic-service-privilege-escalation-vulnerability-cve-2021-36948</loc>
<lastmod>2026-05-17T02:01:24.271851+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-2016-cumulative-update-kb5005030-august-2021</loc>
<lastmod>2026-05-10T14:10:17.300947+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exchange-server-proxyshell-rce-kb5004779-august-2021</loc>
<lastmod>2026-05-16T03:04:15.300026+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-secure-remote-access-sra-sql-injection-vulnerability-cve-2021-20028</loc>
<lastmod>2026-05-17T03:57:18.195342+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2021-30563</loc>
<lastmod>2026-05-17T02:02:21.673795+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/atlassian-confluence-server-pre-authorization-arbitrary-file-read-vulnerability-cve-2021-26085</loc>
<lastmod>2026-05-17T02:02:20.295614+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-multiple-products-improper-input-validation-vulnerability-cve-2021-36741</loc>
<lastmod>2026-05-17T02:00:58.81495+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/trend-micro-multiple-products-improper-input-validation-vulnerability-cve-2021-36742</loc>
<lastmod>2026-05-17T02:03:00.63054+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/forgerock-access-management-am-core-server-remote-code-execution-vulnerability-cve-2021-35464</loc>
<lastmod>2026-05-17T02:02:59.310705+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-sam-local-privilege-escalation-vulnerability-cve-2021-36934</loc>
<lastmod>2026-05-17T02:01:08.912009+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-scripting-engine-memory-corruption-vulnerability-cve-2021-34448</loc>
<lastmod>2026-05-17T02:01:29.323541+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-information-disclosure-vulnerability-cve-2021-31196</loc>
<lastmod>2026-05-17T02:01:36.361564+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2021-31979</loc>
<lastmod>2026-05-17T02:02:20.120405+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-information-disclosure-cve-2021-33766</loc>
<lastmod>2026-05-17T02:01:04.393823+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211</loc>
<lastmod>2026-05-17T02:02:16.475478+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2021-33771</loc>
<lastmod>2026-05-17T02:01:30.125373+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/kaseya-virtual-systemserver-administrator-vsa-information-disclosure-vulnerability-cve-2021-30116</loc>
<lastmod>2026-05-17T02:02:52.624864+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-heap-out-of-bounds-write-vulnerability-cve-2021-22555</loc>
<lastmod>2026-05-17T03:56:31.969235+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/windows-server-print-spooler-rce-kb5004946-july-2021</loc>
<lastmod>2026-05-10T16:31:39.428333+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-webgl-use-after-free-vulnerability-cve-2021-30554</loc>
<lastmod>2026-05-17T02:01:40.494672+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2021-30551</loc>
<lastmod>2026-05-17T02:02:33.346945+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-race-condition-vulnerability-cve-2021-25394</loc>
<lastmod>2026-05-17T03:27:19.98357+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openplc-scadabr-cross-site-scripting-vulnerability-cve-2021-26829</loc>
<lastmod>2026-05-17T02:02:24.278523+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/openplc-scadabr-unrestricted-upload-of-file-with-dangerous-type-vulnerability-cve-2021-26828</loc>
<lastmod>2026-05-17T02:01:30.759549+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-race-condition-vulnerability-cve-2021-25395</loc>
<lastmod>2026-05-17T03:57:10.384461+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gitlab-server-side-request-forgery-ssrf-vulnerability-cve-2021-22175</loc>
<lastmod>2026-05-17T02:02:59.135582+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-improper-input-validation-vulnerability-cve-2020-11261</loc>
<lastmod>2026-05-17T03:56:16.80211+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-mshtml-platform-remote-code-execution-vulnerability-cve-2021-33742</loc>
<lastmod>2026-05-17T02:02:11.972439+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-information-disclosure-vulnerability-cve-2021-31955</loc>
<lastmod>2026-05-17T02:02:21.588272+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-desktop-window-manager-dwm-core-library-privilege-escalation-vulnerability-cve-2021-33739</loc>
<lastmod>2026-05-17T02:01:36.886003+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-enhanced-cryptographic-provider-privilege-escalation-vulnerability-cve-2021-31201</loc>
<lastmod>2026-05-17T02:02:54.568671+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-print-spooler-remote-code-execution-vulnerability-cve-2021-1675</loc>
<lastmod>2026-05-17T02:02:01.830991+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-ntfs-privilege-escalation-vulnerability-cve-2021-31956</loc>
<lastmod>2026-05-17T02:01:32.882164+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-enhanced-cryptographic-provider-privilege-escalation-vulnerability-cve-2021-31199</loc>
<lastmod>2026-05-17T02:01:44.549438+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-popupblocker-security-bypass-vulnerability-cve-2021-30533</loc>
<lastmod>2026-05-17T02:02:15.954647+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-pulse-connect-secure-unrestricted-file-upload-vulnerability-cve-2021-22900</loc>
<lastmod>2026-05-17T03:27:13.906731+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-pulse-connect-secure-collaboration-suite-buffer-overflow-vulnerability-cve-2021-22894</loc>
<lastmod>2026-05-17T03:30:12.590658+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-pulse-connect-secure-command-injection-vulnerability-cve-2021-22899</loc>
<lastmod>2026-05-17T03:27:17.172982+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/checkbox-survey-deserialization-of-untrusted-data-vulnerability-cve-2021-27852</loc>
<lastmod>2026-05-17T02:01:44.726028+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-esxi-vcenter-rce-cve-2021-21985-may-2021</loc>
<lastmod>2026-05-13T01:12:14.883102+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-trusted-firmware-out-of-bounds-write-vulnerability-cve-2021-27562</loc>
<lastmod>2026-05-17T03:30:14.038376+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-mali-gpu-kernel-driver-use-after-free-vulnerability-cve-2021-29256</loc>
<lastmod>2026-05-17T03:30:23.852259+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-nas-improper-authorization-vulnerability-cve-2021-28799</loc>
<lastmod>2026-05-17T02:01:39.175682+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-http-protocol-stack-remote-code-execution-vulnerability-cve-2021-31166</loc>
<lastmod>2026-05-17T02:01:13.757777+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-mali-graphics-processing-unit-gpu-unspecified-vulnerability-cve-2021-28664</loc>
<lastmod>2026-05-17T03:27:37.856596+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arm-mali-graphics-processing-unit-gpu-use-after-free-vulnerability-cve-2021-28663</loc>
<lastmod>2026-05-17T03:27:38.716798+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-detection-of-error-condition-without-action-vulnerability-cve-2021-1906</loc>
<lastmod>2026-05-17T03:57:26.205328+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qualcomm-multiple-chipsets-use-after-free-vulnerability-cve-2021-1905</loc>
<lastmod>2026-05-17T03:31:06.679942+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/tenda-ac11-router-stack-buffer-overflow-vulnerability-cve-2021-31755</loc>
<lastmod>2026-05-17T02:01:16.221328+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/asus-routers-improper-authentication-vulnerability-cve-2021-32030</loc>
<lastmod>2026-05-17T02:00:59.563551+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-hyperflex-hx-installer-virtual-machine-command-injection-vulnerability-cve-2021-1497</loc>
<lastmod>2026-05-17T02:01:14.025476+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cisco-hyperflex-hx-data-platform-command-injection-vulnerability-cve-2021-1498</loc>
<lastmod>2026-05-17T02:01:45.070236+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/dell-dbutil-driver-insufficient-access-control-vulnerability-cve-2021-21551</loc>
<lastmod>2026-05-17T02:01:23.212744+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/arcadyan-buffalo-firmware-path-traversal-vulnerability-cve-2021-20090</loc>
<lastmod>2026-05-17T02:01:22.059176+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-improper-input-validation-vulnerability-cve-2021-21220</loc>
<lastmod>2026-05-17T02:01:02.460663+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2021-21224</loc>
<lastmod>2026-05-17T02:01:41.628801+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-blink-use-after-free-vulnerability-cve-2021-21206</loc>
<lastmod>2026-05-17T02:03:05.191313+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exiftool-remote-code-execution-vulnerability-cve-2021-22204</loc>
<lastmod>2026-05-17T02:03:12.374175+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-pulse-connect-secure-use-after-free-vulnerability-cve-2021-22893</loc>
<lastmod>2026-05-17T03:31:15.994457+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/gitlab-community-and-enterprise-editions-remote-code-execution-vulnerability-cve-2021-22205</loc>
<lastmod>2026-05-17T02:01:27.698204+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-email-security-path-traversal-vulnerability-cve-2021-20023</loc>
<lastmod>2026-05-17T03:28:17.837806+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-network-attached-storage-nas-command-injection-vulnerability-cve-2020-2509</loc>
<lastmod>2026-05-17T02:01:40.3255+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/linux-kernel-privilege-escalation-vulnerability-cve-2021-3493</loc>
<lastmod>2026-05-17T02:01:01.02489+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2021-28310</loc>
<lastmod>2026-05-17T02:03:09.829335+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-email-security-improper-privilege-management-vulnerability-cve-2021-20021</loc>
<lastmod>2026-05-17T03:27:34.708034+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-email-security-unrestricted-upload-of-file-vulnerability-cve-2021-20022</loc>
<lastmod>2026-05-17T03:30:25.946726+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-race-condition-vulnerability-cve-2021-1782</loc>
<lastmod>2026-05-17T03:56:16.019663+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-webkit-remote-code-execution-vulnerability-cve-2021-1871</loc>
<lastmod>2026-05-17T03:57:16.09151+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-type-confusion-vulnerability-cve-2021-1789</loc>
<lastmod>2026-05-17T03:56:43.352881+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-watchos-webkit-cross-site-scripting-xss-vulnerability-cve-2021-1879</loc>
<lastmod>2026-05-17T03:57:22.065436+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-ios-ipados-and-macos-webkit-remote-code-execution-vulnerability-cve-2021-1870</loc>
<lastmod>2026-05-17T03:30:52.366401+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/f5-big-ip-traffic-management-microkernel-buffer-overflow-cve-2021-22991</loc>
<lastmod>2026-05-17T03:56:40.565634+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/f5-big-ip-and-big-iq-centralized-management-icontrol-rest-remote-code-execution-vulnerability-cve-2021-22986</loc>
<lastmod>2026-05-17T03:57:07.554466+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-server-side-request-forgery-in-vrealize-operations-manager-api-cve-2021-21975</loc>
<lastmod>2026-05-17T02:02:19.94623+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-memory-corruption-vulnerability-cve-2021-25370</loc>
<lastmod>2026-05-17T03:27:21.669635+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-improper-access-control-vulnerability-cve-2021-25369</loc>
<lastmod>2026-05-17T03:27:30.262153+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-unspecified-vulnerability-cve-2021-25371</loc>
<lastmod>2026-05-17T03:56:13.895472+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-improper-boundary-check-vulnerability-cve-2021-25372</loc>
<lastmod>2026-05-17T03:56:44.178896+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/micro-focus-access-manager-information-leakage-vulnerability-cve-2021-22506</loc>
<lastmod>2026-05-17T02:02:33.955103+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-blink-use-after-free-vulnerability-cve-2021-21193</loc>
<lastmod>2026-05-17T02:01:27.792431+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-remote-code-execution-vulnerability-cve-2021-27085</loc>
<lastmod>2026-05-17T02:01:40.238921+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-internet-explorer-memory-corruption-vulnerability-cve-2021-26411</loc>
<lastmod>2026-05-17T02:02:39.705061+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-office-remote-code-execution-vulnerability-cve-2021-27059</loc>
<lastmod>2026-05-17T02:01:33.775387+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-race-condition-vulnerability-cve-2021-21166</loc>
<lastmod>2026-05-17T02:01:44.201017+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/samsung-mobile-devices-improper-access-control-vulnerability-cve-2021-25337</loc>
<lastmod>2026-05-17T03:27:13.219634+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/rockwell-multiple-products-insufficient-protected-credentials-vulnerability-cve-2021-22681</loc>
<lastmod>2026-05-17T02:01:47.42862+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/exchange-server-proxylogon-rce-kb5000871-march-2021</loc>
<lastmod>2026-05-16T03:06:34.780004+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veritas-backup-exec-agent-command-execution-vulnerability-cve-2021-27878</loc>
<lastmod>2026-05-17T02:01:52.37711+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veritas-backup-exec-agent-file-access-vulnerability-cve-2021-27876</loc>
<lastmod>2026-05-17T02:02:39.876241+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/veritas-backup-exec-agent-improper-authentication-vulnerability-cve-2021-27877</loc>
<lastmod>2026-05-17T02:03:06.157512+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-win32k-privilege-escalation-vulnerability-cve-2021-1732</loc>
<lastmod>2026-05-17T02:01:48.297151+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-and-cloud-foundation-server-side-request-forgery-ssrf-vulnerability-cve-2021-21973</loc>
<lastmod>2026-05-17T02:01:56.562179+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/vmware-vcenter-server-remote-code-execution-vulnerability-cve-2021-21972</loc>
<lastmod>2026-05-17T02:02:44.492591+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/accellion-fta-os-command-injection-vulnerability-cve-2021-27104</loc>
<lastmod>2026-05-17T02:01:34.59743+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/system-information-library-for-nodejs-command-injection-cve-2021-21315</loc>
<lastmod>2026-05-17T02:01:20.43538+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/accellion-fta-os-command-injection-vulnerability-cve-2021-27102</loc>
<lastmod>2026-05-17T02:02:54.940111+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/accellion-fta-sql-injection-vulnerability-cve-2021-27101</loc>
<lastmod>2026-05-17T02:01:28.334045+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/accellion-fta-server-side-request-forgery-ssrf-vulnerability-cve-2021-27103</loc>
<lastmod>2026-05-17T02:02:07.140478+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nagios-xi-os-command-injection-cve-2021-25298</loc>
<lastmod>2026-05-17T02:02:37.433318+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nagios-xi-os-command-injection-cve-2021-25297</loc>
<lastmod>2026-05-17T02:02:52.276616+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/nagios-xi-os-command-injection-cve-2021-25296</loc>
<lastmod>2026-05-17T02:01:54.652628+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adobe-acrobat-and-reader-heap-based-buffer-overflow-vulnerability-cve-2021-21017</loc>
<lastmod>2026-05-17T02:01:08.187009+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/adminer-server-side-request-forgery-vulnerability-cve-2021-21311</loc>
<lastmod>2026-05-17T02:02:44.23007+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/mcafee-total-protection-mtp-improper-privilege-management-vulnerability-cve-2021-23874</loc>
<lastmod>2026-05-17T02:01:33.146686+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-heap-buffer-overflow-vulnerability-cve-2021-21148</loc>
<lastmod>2026-05-17T02:01:10.010747+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/micro-focus-operation-bridge-report-obr-remote-code-execution-vulnerability-cve-2021-22502</loc>
<lastmod>2026-05-17T02:01:50.985724+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sonicwall-sslvpn-sma100-sql-injection-vulnerability-cve-2021-20016</loc>
<lastmod>2026-05-17T03:27:25.236504+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-helpdesk-improper-access-control-vulnerability-cve-2020-2506</loc>
<lastmod>2026-05-17T02:02:38.39323+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dns-320-device-command-injection-vulnerability-cve-2020-25506</loc>
<lastmod>2026-05-17T02:01:00.016139+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/d-link-dir-825-r1-devices-buffer-overflow-vulnerability-cve-2020-29557</loc>
<lastmod>2026-05-17T03:27:20.646449+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/sudo-heap-based-buffer-overflow-vulnerability-cve-2021-3156</loc>
<lastmod>2026-05-17T02:02:42.924825+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/pear-archivetar-improper-link-resolution-vulnerability-cve-2020-36193</loc>
<lastmod>2026-05-17T02:02:26.875762+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-media-use-after-free-vulnerability-cve-2020-6572</loc>
<lastmod>2026-05-17T02:01:34.879879+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/laravel-ignition-file-upload-vulnerability-cve-2021-3129</loc>
<lastmod>2026-05-17T02:03:00.104147+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-defender-remote-code-execution-vulnerability-cve-2021-1647</loc>
<lastmod>2026-05-17T02:02:11.035351+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-incorrect-implementation-vulnerabililty-cve-2020-16013</loc>
<lastmod>2026-05-17T02:01:54.39423+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-use-after-free-vulnerability-cve-2020-16017</loc>
<lastmod>2026-05-17T02:02:10.157961+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-flink-improper-access-control-vulnerability-cve-2020-17519</loc>
<lastmod>2026-05-17T02:02:21.23909+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/solarwinds-orion-authentication-bypass-vulnerability-cve-2020-10148</loc>
<lastmod>2026-05-17T02:02:52.008302+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/roundcube-webmail-cross-site-scripting-xss-vulnerability-cve-2020-35730</loc>
<lastmod>2026-05-17T02:01:49.694731+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/zyxel-multiple-products-use-of-hard-coded-credentials-vulnerability-cve-2020-29583</loc>
<lastmod>2026-05-17T03:27:35.070074+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/cyberoamos-cros-sql-injection-vulnerability-cve-2020-29574</loc>
<lastmod>2026-05-17T02:01:44.985539+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-struts-remote-code-execution-vulnerability-cve-2020-17530</loc>
<lastmod>2026-05-17T02:01:57.169336+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-exchange-server-remote-code-execution-vulnerability-cve-2020-17144</loc>
<lastmod>2026-05-17T02:00:59.088517+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-memory-initialization-vulnerability-cve-2020-27950</loc>
<lastmod>2026-05-17T03:27:25.476699+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-memory-corruption-vulnerability-cve-2020-27930</loc>
<lastmod>2026-05-17T03:56:27.481815+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apple-multiple-products-type-confusion-vulnerability-cve-2020-27932</loc>
<lastmod>2026-05-17T03:30:04.403791+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/multiple-vmware-products-command-injection-vulnerability-cve-2020-4006</loc>
<lastmod>2026-05-17T02:01:17.727984+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/drupal-core-un-restricted-upload-of-file-cve-2020-13671</loc>
<lastmod>2026-05-17T02:01:30.580998+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/pear-archivetar-deserialization-of-untrusted-data-vulnerability-cve-2020-28949</loc>
<lastmod>2026-05-17T02:03:13.425548+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/microsoft-windows-kernel-privilege-escalation-vulnerability-cve-2020-17087</loc>
<lastmod>2026-05-17T02:01:40.579737+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/apache-airflows-experimental-api-authentication-bypass-cve-2020-13927</loc>
<lastmod>2026-05-17T02:02:43.271286+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/saltstack-salt-shell-injection-vulnerability-cve-2020-16846</loc>
<lastmod>2026-05-17T02:01:27.341222+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-for-android-ui-heap-buffer-overflow-vulnerability-cve-2020-16010</loc>
<lastmod>2026-05-17T03:30:15.396635+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chrome-freetype-heap-buffer-overflow-vulnerability-cve-2020-15999</loc>
<lastmod>2026-05-17T02:02:34.655182+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/google-chromium-v8-type-confusion-vulnerability-cve-2020-16009</loc>
<lastmod>2026-05-17T02:03:10.708268+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-remote-code-execution-vulnerability-cve-2020-14750</loc>
<lastmod>2026-05-17T02:01:48.031644+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-nas-file-station-cross-site-scripting-vulnerability-cve-2018-19953</loc>
<lastmod>2026-05-17T02:01:20.528263+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-nas-file-station-cross-site-scripting-vulnerability-cve-2018-19943</loc>
<lastmod>2026-05-17T02:01:29.588501+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/ivanti-pulse-connect-secure-code-execution-vulnerability-cve-2020-8260</loc>
<lastmod>2026-05-17T03:56:48.980639+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/qnap-nas-file-station-command-injection-vulnerability-cve-2018-19949</loc>
<lastmod>2026-05-17T02:01:44.376518+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-business-intelligence-enterprise-edition-path-transversal-cve-2020-14864</loc>
<lastmod>2026-05-17T02:01:04.112928+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://ironsmithintel.com/vulnerability/oracle-weblogic-server-unspecified-vulnerability-cve-2020-14883</loc>
<lastmod>2026-05-17T02:02:21.065118+00:00</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
