<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-20805-microsoft-windows-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-20045-cisco-unified-communications-products-code-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-21509-microsoft-office-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-24061-gnu-inetutils-argument-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-23760-smartertools-smartermail-authentication-bypass-using-an-alternate-path-or-channel-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-24858-fortinet-multiple-products-authentication-bypass-using-an-alternate-path-or-channel-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-1281-ivanti-endpoint-manager-mobile-epmm-code-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-24423-smartertools-smartermail-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-21514-microsoft-office-word-reliance-on-untrusted-inputs-in-a-security-decision-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-21519-microsoft-windows-type-confusion-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-21533-microsoft-windows-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-21510-microsoft-windows-shell-protection-mechanism-failure-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-21525-microsoft-windows-null-pointer-dereference-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-21513-microsoft-mshtml-framework-protection-mechanism-failure-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-20700-apple-multiple-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-1731-beyondtrust-remote-support-rs-and-privileged-remote-access-pra-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-2441-google-chromium-css-use-after-free-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-22769-dell-recoverpoint-for-virtual-machines-rp4vms-use-of-hard-coded-credentials-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-25108-soliton-systems-k-k-filezen-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-20127-cisco-catalyst-sd-wan-controller-and-manager-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-21385-qualcomm-multiple-chipsets-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-22719-broadcom-vmware-aria-operations-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-1603-ivanti-endpoint-manager-epm-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-3909-google-skia-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-3910-google-chromium-v8-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-20963-microsoft-sharepoint-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-20131-cisco-secure-firewall-management-center-fmc-software-and-cisco-security-cloud-control-scc-firewall-management-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-33017-langflow-code-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-33634-aquasecurity-trivy-embedded-malicious-code-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2026-3055-citrix-netscaler-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-0282-ivanti-connect-secure-policy-secure-and-zta-gateways-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21333-microsoft-windows-hyper-v-nt-kernel-integration-vsp-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21334-microsoft-windows-hyper-v-nt-kernel-integration-vsp-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21335-microsoft-windows-hyper-v-nt-kernel-integration-vsp-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-23006-sonicwall-sma1000-appliances-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24085-apple-multiple-products-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-0411-7-zip-mark-of-the-web-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-0994-trimble-cityworks-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21391-microsoft-windows-storage-link-following-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21418-microsoft-windows-ancillary-function-driver-for-winsock-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24200-apple-ios-and-ipados-incorrect-authorization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-0108-palo-alto-networks-pan-os-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-23209-craft-cms-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-0111-palo-alto-networks-pan-os-file-read-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24989-microsoft-power-pages-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-22224-vmware-esxi-and-workstation-toctou-race-condition-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-22225-vmware-esxi-arbitrary-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-22226-vmware-esxi-workstation-and-fusion-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-25181-advantive-veracore-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-26633-microsoft-windows-management-console-mmc-improper-neutralization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24983-microsoft-windows-win32k-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24984-microsoft-windows-ntfs-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24985-microsoft-windows-fast-fat-file-system-driver-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24991-microsoft-windows-ntfs-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24993-microsoft-windows-ntfs-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24201-apple-multiple-products-webkit-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21590-juniper-junos-os-improper-isolation-or-compartmentalization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24472-fortinet-fortios-and-fortiproxy-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-30066-tj-actions-changed-files-github-action-embedded-malicious-code-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-1316-edimax-ic-7100-ip-camera-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-30154-reviewdog-action-setup-github-action-embedded-malicious-code-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-2783-google-chromium-mojo-sandbox-escape-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24813-apache-tomcat-path-equivalence-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-22457-ivanti-connect-secure-policy-secure-and-zta-gateways-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-31161-crushftp-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-30406-gladinet-centrestack-and-triofox-use-of-hard-coded-cryptographic-key-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-29824-microsoft-windows-common-log-file-system-clfs-driver-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-31200-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-31201-apple-multiple-products-arbitrary-read-and-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24054-microsoft-windows-ntlm-hash-disclosure-spoofing-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-3928-commvault-web-server-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-42599-qualitia-active-mail-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-1976-broadcom-brocade-fabric-os-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-31324-sap-netweaver-unrestricted-file-upload-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-34028-commvault-command-center-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-3248-langflow-missing-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-27363-freetype-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-47729-telemessage-tm-sgnl-hidden-functionality-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-30400-microsoft-windows-dwm-core-library-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-32701-microsoft-windows-common-log-file-system-clfs-driver-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-32706-microsoft-windows-common-log-file-system-clfs-driver-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-30397-microsoft-windows-scripting-engine-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-32709-microsoft-windows-ancillary-function-driver-for-winsock-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-32756-fortinet-multiple-products-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-42999-sap-netweaver-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-4427-ivanti-endpoint-manager-mobile-epmm-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-4428-ivanti-endpoint-manager-mobile-epmm-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-27920-srimax-output-messenger-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-4632-samsung-magicinfo-9-server-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-35939-craft-cms-external-control-of-assumed-immutable-web-parameter-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-3935-connectwise-screenconnect-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-27038-qualcomm-multiple-chipsets-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21480-qualcomm-multiple-chipsets-incorrect-authorization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21479-qualcomm-multiple-chipsets-incorrect-authorization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-5419-google-chromium-v8-out-of-bounds-read-and-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-32433-erlang-erlang-otp-ssh-server-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24016-wazuh-server-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-33053-microsoft-windows-external-control-of-file-name-or-path-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-43200-apple-multiple-products-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-6543-citrix-netscaler-adc-and-gateway-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-48927-telemessage-tm-sgnl-initialization-of-a-resource-with-an-insecure-default-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-48928-telemessage-tm-sgnl-exposure-of-core-dump-file-to-an-unauthorized-control-sphere-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-6554-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-5777-citrix-netscaler-adc-and-gateway-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-47812-wing-ftp-server-improper-neutralization-of-null-byte-or-nul-character-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-25257-fortinet-fortiweb-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-53770-microsoft-sharepoint-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-49706-microsoft-sharepoint-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-49704-microsoft-sharepoint-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-54309-crushftp-unprotected-alternate-channel-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-6558-google-chromium-angle-and-gpu-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-2776-sysaid-on-prem-improper-restriction-of-xml-external-entity-reference-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-2775-sysaid-on-prem-improper-restriction-of-xml-external-entity-reference-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-20281-cisco-identity-services-engine-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-20337-cisco-identity-services-engine-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-8088-rarlab-winrar-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-8875-n-able-n-central-insecure-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-8876-n-able-n-central-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-54948-trend-micro-apex-one-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-43300-apple-ios-ipados-and-macos-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-48384-git-link-following-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-7775-citrix-netscaler-memory-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-57819-sangoma-freepbx-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-55177-meta-platforms-whatsapp-incorrect-authorization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-9377-tp-link-archer-c7-eu-and-tl-wr841n-nd-ms-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-53690-sitecore-multiple-products-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-48543-android-runtime-use-after-free-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-38352-linux-kernel-time-of-check-time-of-use-toctou-race-condition-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-5086-dassault-syst-mes-delmia-apriso-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-10585-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-20333-cisco-secure-firewall-adaptive-security-appliance-asa-and-secure-firewall-threat-defense-ftd-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-20362-cisco-secure-firewall-adaptive-security-asa-appliance-and-secure-firewall-threat-defense-ftd-missing-authorization-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-20352-cisco-ios-and-ios-xe-software-snmp-denial-of-service-and-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-10035-fortra-goanywhere-mft-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-59689-libraesva-email-security-gateway-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-32463-sudo-inclusion-of-functionality-from-untrusted-control-sphere-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-4008-smartbedded-meteobridge-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21043-samsung-mobile-devices-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-61882-oracle-e-business-suite-unspecified-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-27915-synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-59230-microsoft-windows-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24990-microsoft-windows-untrusted-pointer-dereference-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-47827-igel-os-use-of-a-key-past-its-expiration-date-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-54253-adobe-experience-manager-forms-code-execution-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-61884-oracle-e-business-suite-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-33073-microsoft-windows-smb-client-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-2747-kentico-xperience-cms-authentication-bypass-using-an-alternate-path-or-channel-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-2746-kentico-xperience-cms-authentication-bypass-using-an-alternate-path-or-channel-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-61932-motex-lanscope-endpoint-manager-improper-verification-of-source-of-a-communication-channel-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-59287-microsoft-windows-server-update-service-wsus-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-54236-adobe-commerce-and-magento-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-6205-dassault-syst-mes-delmia-apriso-missing-authorization-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-6204-dassault-syst-mes-delmia-apriso-code-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-24893-xwiki-platform-eval-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-41244-broadcom-vmware-aria-operations-and-vmware-tools-privilege-defined-with-unsafe-actions-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-11371-gladinet-centrestack-and-triofox-files-or-directories-accessible-to-external-parties-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-48703-cwp-control-web-panel-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-21042-samsung-mobile-devices-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-9242-watchguard-firebox-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-62215-microsoft-windows-race-condition-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-12480-gladinet-triofox-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-64446-fortinet-fortiweb-path-traversal-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-58034-fortinet-fortiweb-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-13223-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-61757-oracle-fusion-middleware-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-48572-android-framework-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-48633-android-framework-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-55182-meta-react-server-components-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-66644-array-networks-arrayos-ag-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-62221-microsoft-windows-use-after-free-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-6218-rarlab-winrar-path-traversal-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-58360-osgeo-geoserver-improper-restriction-of-xml-external-entity-reference-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-14174-google-chromium-out-of-bounds-memory-access-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-43529-apple-multiple-products-use-after-free-webkit-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-14611-gladinet-centrestack-and-triofox-hard-coded-cryptographic-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-59718-fortinet-multiple-products-improper-verification-of-cryptographic-signature-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-20393-cisco-multiple-products-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-40602-sonicwall-sma1000-missing-authorization-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-59374-asus-live-update-embedded-malicious-code-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-14733-watchguard-firebox-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-14847-mongodb-and-mongodb-server-improper-handling-of-length-parameter-inconsistency-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-37164-hewlett-packard-enterprise-hpe-oneview-code-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-8110-gogs-path-traversal-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-54313-prettier-eslint-config-prettier-embedded-malicious-code-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-31125-vite-vitejs-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-34026-versa-concerto-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-68645-synacor-zimbra-collaboration-suite-zcs-php-remote-file-inclusion-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-52691-smartertools-smartermail-unrestricted-upload-of-file-with-dangerous-type-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-40551-solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-64328-sangoma-freepbx-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-11953-react-native-community-cli-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-40536-solarwinds-web-help-desk-security-control-bypass-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-15556-notepad-download-of-code-without-integrity-check-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-68461-roundcube-webmail-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-49113-roundcube-webmail-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-26399-solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-68613-n8n-improper-control-of-dynamically-managed-code-resources-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-47813-wing-ftp-server-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-66376-synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-31277-apple-multiple-products-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-43520-apple-multiple-products-classic-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-43510-apple-multiple-products-improper-locking-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-54068-laravel-livewire-code-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-32432-craft-cms-code-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2025-53521-f5-big-ip-unspecified-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21887-ivanti-connect-secure-and-policy-secure-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-0519-google-chromium-v8-out-of-bounds-memory-access-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-23222-apple-multiple-products-webkit-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21893-ivanti-connect-secure-policy-secure-and-neurons-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21762-fortinet-fortios-out-of-bound-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21351-microsoft-windows-smartscreen-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21412-microsoft-windows-internet-shortcut-files-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21410-microsoft-exchange-server-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-1709-connectwise-screenconnect-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21338-microsoft-windows-kernel-exposed-ioctl-with-insufficient-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-23296-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-23225-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-27198-jetbrains-teamcity-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-29745-android-pixel-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-29748-android-pixel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-3272-d-link-multiple-nas-devices-use-of-hard-coded-credentials-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-3273-d-link-multiple-nas-devices-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-3400-palo-alto-networks-pan-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-20353-cisco-asa-and-ftd-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-20359-cisco-asa-and-ftd-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4040-crushftp-vfs-sandbox-escape-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-29988-microsoft-smartscreen-prompt-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4671-google-chromium-visuals-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-30051-microsoft-dwm-core-library-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-30040-microsoft-windows-mshtml-platform-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4761-google-chromium-v8-out-of-bounds-memory-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4947-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-5274-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4978-justice-av-solutions-javs-viewer-installer-embedded-malicious-code-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-24919-check-point-quantum-security-gateways-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-1086-linux-kernel-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4610-arm-mali-gpu-kernel-driver-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4577-php-cgi-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-32896-android-pixel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-26169-microsoft-windows-error-reporting-service-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4358-progress-telerik-report-server-authentication-bypass-by-spoofing-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-20399-cisco-nx-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38112-microsoft-windows-mshtml-platform-spoofing-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38080-microsoft-windows-hyper-v-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-23692-rejetto-http-file-server-improper-neutralization-of-special-elements-used-in-a-template-engine-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-36401-osgeo-geoserver-geotools-eval-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-34102-adobe-commerce-and-magento-open-source-improper-restriction-of-xml-external-entity-reference-xxe-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-28995-solarwinds-serv-u-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-39891-twilio-authy-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4879-servicenow-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-5217-servicenow-incomplete-list-of-disallowed-inputs-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-37085-vmware-esxi-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-36971-android-kernel-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-32113-apache-ofbiz-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38189-microsoft-project-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38178-microsoft-windows-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38213-microsoft-windows-smartscreen-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38193-microsoft-windows-ancillary-function-driver-for-winsock-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38106-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38107-microsoft-windows-power-dependency-coordinator-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-28986-solarwinds-web-help-desk-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-23897-jenkins-command-line-interface-cli-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-7971-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38856-apache-ofbiz-incorrect-authorization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-7965-google-chromium-v8-inappropriate-implementation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-7262-kingsoft-wps-office-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-40766-sonicwall-sonicos-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38226-microsoft-publisher-protection-mechanism-failure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38014-microsoft-windows-installer-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38217-microsoft-windows-mark-of-the-web-motw-protection-mechanism-failure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-8190-ivanti-cloud-services-appliance-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-43461-microsoft-windows-mshtml-platform-spoofing-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-6670-progress-whatsup-gold-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-27348-apache-hugegraph-server-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-8963-ivanti-cloud-services-appliance-csa-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-7593-ivanti-virtual-traffic-manager-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-29824-ivanti-endpoint-manager-epm-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-45519-synacor-zimbra-collaboration-suite-zcs-command-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-43047-qualcomm-multiple-chipsets-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-43572-microsoft-windows-management-console-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-43573-microsoft-windows-mshtml-platform-spoofing-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-23113-fortinet-multiple-products-format-string-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-9379-ivanti-cloud-services-appliance-csa-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-9380-ivanti-cloud-services-appliance-csa-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-30088-microsoft-windows-kernel-toctou-race-condition-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-9680-mozilla-firefox-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-40711-veeam-backup-and-replication-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-9537-sciencelogic-sl1-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38094-microsoft-sharepoint-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-47575-fortinet-fortimanager-missing-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-20481-cisco-asa-and-ftd-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-37383-roundcube-webmail-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-8957-ptzoptics-pt30x-sdi-ndi-cameras-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-8956-ptzoptics-pt30x-sdi-ndi-cameras-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-5910-palo-alto-networks-expedition-missing-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-43093-android-framework-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-51567-cyberpanel-incorrect-default-permissions-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-49039-microsoft-windows-task-scheduler-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-43451-microsoft-windows-ntlmv2-hash-disclosure-spoofing-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-9463-palo-alto-networks-expedition-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-9465-palo-alto-networks-expedition-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-1212-progress-kemp-loadmaster-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-0012-palo-alto-networks-pan-os-management-interface-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-9474-palo-alto-networks-pan-os-management-interface-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38812-vmware-vcenter-server-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38813-vmware-vcenter-server-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-44308-apple-multiple-products-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-44309-apple-multiple-products-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21287-oracle-agile-product-lifecycle-management-plm-incorrect-authorization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-11680-projectsend-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-11667-zyxel-multiple-firewalls-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-51378-cyberpanel-incorrect-default-permissions-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-49138-microsoft-windows-common-log-file-system-clfs-driver-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-50623-cleo-multiple-products-unrestricted-file-upload-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-20767-adobe-coldfusion-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-35250-microsoft-windows-kernel-mode-driver-untrusted-pointer-dereference-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-55956-cleo-multiple-products-unauthenticated-file-upload-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-12356-beyondtrust-privileged-remote-access-pra-and-remote-support-rs-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-3393-palo-alto-networks-pan-os-malicious-dns-packet-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-41713-mitel-micollab-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-55550-mitel-micollab-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-12686-beyondtrust-privileged-remote-access-pra-and-remote-support-rs-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-55591-fortinet-fortios-and-fortiproxy-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-50603-aviatrix-controllers-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-45195-apache-ofbiz-forced-browsing-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-29059-microsoft-net-framework-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-53104-linux-kernel-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-21413-microsoft-outlook-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-40890-zyxel-dsl-cpe-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-40891-zyxel-dsl-cpe-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-41710-mitel-sip-phones-argument-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-57727-simplehelp-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-53704-sonicwall-sonicos-sslvpn-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-20953-oracle-agile-product-lifecycle-management-plm-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-49035-microsoft-partner-center-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-4885-progress-whatsup-gold-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-50302-linux-kernel-use-of-uninitialized-resource-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-57968-advantive-veracore-unrestricted-file-upload-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-13159-ivanti-endpoint-manager-epm-absolute-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-13160-ivanti-endpoint-manager-epm-absolute-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-13161-ivanti-endpoint-manager-epm-absolute-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-48248-nakivo-backup-and-replication-absolute-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-20439-cisco-smart-licensing-utility-static-credential-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-53197-linux-kernel-out-of-bounds-access-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-53150-linux-kernel-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-38475-apache-http-server-improper-escaping-of-output-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-58136-yiiframework-yii-improper-protection-of-alternate-path-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-6047-geovision-devices-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-11120-geovision-devices-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-12987-draytek-vigor-routers-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-11182-mdaemon-email-server-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-27443-synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-56145-craft-cms-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-42009-roundcube-webmail-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-54085-ami-megarac-spx-authentication-bypass-by-spoofing-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-0769-d-link-dir-859-router-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-8069-citrix-session-recording-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-8068-citrix-session-recording-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-37079-broadcom-vmware-vcenter-server-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-43468-microsoft-configuration-manager-sql-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2024-7694-teamt5-threatsonar-anti-ransomware-unrestricted-upload-of-file-with-dangerous-type-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-21674-microsoft-windows-advanced-local-procedure-call-alpc-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-22952-multiple-sugarcrm-products-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-0669-fortra-goanywhere-mft-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-21823-microsoft-windows-graphic-component-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-23529-apple-multiple-products-webkit-type-confusion-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-23376-microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-21715-microsoft-office-publisher-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-24880-microsoft-windows-smartscreen-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-23397-microsoft-office-outlook-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-26360-adobe-coldfusion-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-0266-linux-kernel-use-after-free-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-26083-arm-mali-gpu-kernel-driver-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28206-apple-ios-ipados-and-macos-iosurfaceaccelerator-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28205-apple-multiple-products-webkit-use-after-free-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28252-microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-29492-novi-survey-insecure-deserialization-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-20963-android-framework-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-2033-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-2136-google-chrome-skia-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-27350-papercut-mf-ng-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28432-minio-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-21839-oracle-weblogic-server-unspecified-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-1389-tp-link-archer-ax-21-command-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-29336-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-25717-multiple-ruckus-wireless-products-csrf-and-rce-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-21492-samsung-mobile-devices-insertion-of-sensitive-information-into-log-file-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-32373-apple-multiple-products-webkit-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28204-apple-multiple-products-webkit-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-32409-apple-multiple-products-webkit-sandbox-escape-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-2868-barracuda-networks-esg-appliance-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28771-zyxel-multiple-firewalls-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-34362-progress-moveit-transfer-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-33010-zyxel-multiple-firewalls-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-33009-zyxel-multiple-firewalls-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-3079-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-27997-fortinet-fortios-and-fortiproxy-ssl-vpn-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-20887-vmware-aria-operations-for-networks-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-27992-zyxel-multiple-nas-devices-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-20867-vmware-tools-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-32439-apple-multiple-products-webkit-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-32435-apple-multiple-products-webkit-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-32434-apple-multiple-products-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36874-microsoft-windows-error-reporting-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-35311-microsoft-outlook-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-32049-microsoft-windows-defender-smartscreen-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-32046-microsoft-windows-mshtml-platform-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-37450-apple-multiple-products-webkit-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36884-microsoft-windows-search-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-3519-citrix-netscaler-adc-and-netscaler-gateway-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-38205-adobe-coldfusion-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-29298-adobe-coldfusion-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-35078-ivanti-endpoint-manager-mobile-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-38606-apple-multiple-products-kernel-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-37580-synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-35081-ivanti-endpoint-manager-mobile-epmm-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-38180-microsoft-net-core-and-visual-studio-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-24489-citrix-content-collaboration-sharefile-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-26359-adobe-coldfusion-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-27532-veeam-backup-replication-cloud-connect-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-38035-ivanti-sentry-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-32315-ignite-realtime-openfire-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-38831-rarlab-winrar-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-33246-apache-rocketmq-command-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41061-apple-ios-ipados-and-watchos-wallet-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41064-apple-ios-ipados-and-macos-imageio-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36802-microsoft-streaming-service-proxy-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36761-microsoft-word-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-4863-google-chromium-webp-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-20269-cisco-adaptive-security-appliance-and-firepower-threat-defense-unauthorized-access-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-35674-android-framework-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-26369-adobe-acrobat-and-reader-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28434-minio-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41179-trend-micro-apex-one-and-worry-free-business-security-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41993-apple-multiple-products-webkit-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41992-apple-multiple-products-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41991-apple-multiple-products-improper-certificate-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-5217-google-chromium-libvpx-heap-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-4211-arm-mali-gpu-kernel-driver-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28229-microsoft-windows-cng-key-isolation-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-42793-jetbrains-teamcity-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-42824-apple-ios-and-ipados-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-40044-progress-ws-ftp-server-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-22515-atlassian-confluence-data-center-and-server-broken-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-44487-http-2-rapid-reset-attack-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36563-microsoft-wordpad-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41763-microsoft-skype-for-business-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-20109-cisco-ios-and-ios-xe-group-encrypted-transport-vpn-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-21608-adobe-acrobat-and-reader-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-20198-cisco-ios-xe-web-ui-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-4966-citrix-netscaler-adc-and-netscaler-gateway-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-20273-cisco-ios-xe-web-ui-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-5631-roundcube-webmail-persistent-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-46747-f5-big-ip-configuration-utility-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-46748-f5-big-ip-configuration-utility-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-46604-apache-activemq-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-22518-atlassian-confluence-data-center-and-server-improper-authorization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-29552-service-location-protocol-slp-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36851-juniper-junos-os-srx-series-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36847-juniper-junos-os-ex-series-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36846-juniper-junos-os-srx-series-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36845-juniper-junos-os-ex-series-and-srx-series-php-external-variable-modification-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36844-juniper-junos-os-ex-series-php-external-variable-modification-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-47246-sysaid-server-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36036-microsoft-windows-cloud-files-mini-filter-driver-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36025-microsoft-windows-smartscreen-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36033-microsoft-windows-desktop-window-manager-dwm-core-library-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-1671-sophos-web-appliance-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-36584-microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-4911-gnu-c-library-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-49103-owncloud-graphapi-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-6345-google-skia-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-42916-apple-multiple-products-webkit-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-42917-apple-multiple-products-webkit-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-33063-qualcomm-multiple-chipsets-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-33106-qualcomm-multiple-chipsets-use-of-out-of-range-pointer-offset-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-33107-qualcomm-multiple-chipsets-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41265-qlik-sense-http-tunneling-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41266-qlik-sense-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-6448-unitronics-vision-plc-and-hmi-insecure-default-password-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-47565-qnap-viostor-nvr-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-49897-fxc-ae1021-ae1021pe-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-7024-google-chromium-webrtc-heap-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-7101-spreadsheet-parseexcel-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-38203-adobe-coldfusion-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-29300-adobe-coldfusion-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-27524-apache-superset-insecure-default-initialization-of-resource-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41990-apple-multiple-products-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-23752-joomla-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-46805-ivanti-connect-secure-and-policy-secure-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-29357-microsoft-sharepoint-server-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-6548-citrix-netscaler-adc-and-netscaler-gateway-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-6549-citrix-netscaler-adc-and-netscaler-gateway-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-35082-ivanti-endpoint-manager-mobile-epmm-and-mobileiron-core-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-34048-vmware-vcenter-server-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-22527-atlassian-confluence-data-center-and-server-template-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-4762-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-43770-roundcube-webmail-persistent-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-29360-microsoft-streaming-service-untrusted-pointer-dereference-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-21237-android-pixel-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-48788-fortinet-forticlient-ems-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-24955-microsoft-sharepoint-server-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-7028-gitlab-community-and-enterprise-editions-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-43208-nextgen-healthcare-mirth-connect-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-45249-acronis-cyber-infrastructure-aci-insecure-default-password-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-25280-d-link-dir-820-router-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-28461-array-networks-ag-and-vxag-arrayos-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-45727-north-grid-proself-improper-restriction-of-xml-external-entity-xxe-reference-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-48365-qlik-sense-http-tunneling-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-34192-synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-20118-cisco-small-business-rv-series-routers-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-44221-sonicwall-sma100-appliances-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-38950-zkteco-biotime-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-39780-asus-rt-ax55-routers-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-33538-tp-link-multiple-routers-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-0386-linux-kernel-improper-ownership-management-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-2533-papercut-ng-mf-cross-site-request-forgery-csrf-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-50224-tp-link-tl-wr841n-authentication-bypass-by-spoofing-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-52163-digiever-ds-2105-pro-missing-authorization-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-41974-apple-ios-and-ipados-use-after-free-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2023-43000-apple-multiple-products-use-after-free-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22587-apple-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-21882-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22620-apple-ios-ipados-and-macos-webkit-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-0609-google-chromium-animation-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-24086-adobe-commerce-and-magento-open-source-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-23134-zabbix-frontend-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-23131-zabbix-frontend-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-24682-synacor-zimbra-collaborate-suite-zcs-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-20699-cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-20700-cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-20701-cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-20703-cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-20708-cisco-small-business-rv-series-routers-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26485-mozilla-firefox-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26486-mozilla-firefox-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-21999-microsoft-windows-print-spooler-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26143-micollab-mivoice-business-express-access-control-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26318-watchguard-firebox-and-xtm-appliances-arbitrary-code-execution</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-0543-debian-specific-redis-server-lua-sandbox-escape-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-1096-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-1040-sophos-firewall-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26871-trend-micro-apex-central-arbitrary-file-upload-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22674-apple-macos-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22675-apple-macos-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22965-spring-framework-jdk-9-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-23176-watchguard-firebox-and-xtm-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-24521-microsoft-windows-clfs-driver-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22954-vmware-workspace-one-access-and-identity-manager-server-side-template-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-1364-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22960-vmware-multiple-products-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22718-microsoft-windows-print-spooler-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-0847-linux-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-21919-microsoft-windows-user-profile-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26904-microsoft-windows-user-profile-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-29464-wso2-multiple-products-unrestrictive-upload-of-file-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-1388-f5-big-ip-missing-authentication-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22947-vmware-spring-cloud-gateway-code-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-30525-zyxel-multiple-firewalls-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-20821-cisco-ios-xr-open-port-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26134-atlassian-confluence-server-and-data-center-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-30190-microsoft-windows-support-diagnostic-tool-msdt-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-29499-mitel-mivoice-connect-data-validation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26925-microsoft-windows-lsa-spoofing-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22047-microsoft-windows-client-server-runtime-subsystem-csrss-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26138-atlassian-questions-for-confluence-app-hard-coded-credentials-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-27924-synacor-zimbra-collaboration-suite-zcs-command-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-30333-rarlab-unrar-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-34713-microsoft-windows-support-diagnostic-tool-msdt-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-37042-synacor-zimbra-collaboration-suite-zcs-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-27925-synacor-zimbra-collaboration-suite-zcs-arbitrary-file-upload-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-21971-microsoft-windows-runtime-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26923-microsoft-active-directory-domain-services-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-2856-google-chromium-intents-insufficient-input-validation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-32893-apple-ios-and-macos-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-32894-apple-ios-and-macos-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22536-sap-multiple-products-http-request-smuggling-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-0028-palo-alto-networks-pan-os-reflected-amplification-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-2294-webrtc-heap-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22963-vmware-tanzu-spring-cloud-function-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-24112-apache-apisix-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-24706-apache-couchdb-insecure-default-initialization-of-resource-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26352-dotcms-unrestricted-upload-of-file-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26258-d-link-dir-820l-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-27593-qnap-photo-station-externally-controlled-reference-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-3075-google-chromium-mojo-insufficient-data-validation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-32917-apple-ios-ipados-and-macos-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-37969-microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-40139-trend-micro-apex-one-and-apex-one-as-a-service-improper-validation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-35405-zoho-manageengine-multiple-products-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-3236-sophos-firewall-code-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-36804-atlassian-bitbucket-server-and-data-center-command-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41040-microsoft-exchange-server-server-side-request-forgery-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41082-microsoft-exchange-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41033-microsoft-windows-com-event-system-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-40684-fortinet-multiple-products-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41352-synacor-zimbra-collaboration-suite-zcs-arbitrary-file-upload-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-42827-apple-ios-and-ipados-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-3723-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41128-microsoft-windows-scripting-languages-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41125-microsoft-windows-cng-key-isolation-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41073-microsoft-windows-print-spooler-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41091-microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41049-microsoft-windows-mark-of-the-web-motw-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-4135-google-chromium-gpu-heap-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-4262-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26501-veeam-backup-replication-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-26500-veeam-backup-replication-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-27518-citrix-application-delivery-controller-adc-and-gateway-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-44698-microsoft-defender-smartscreen-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-42475-fortinet-fortios-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-42856-apple-ios-type-confusion-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41080-microsoft-exchange-server-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-44877-cwp-control-web-panel-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-47966-zoho-manageengine-multiple-products-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-21587-oracle-e-business-suite-unspecified-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-24990-terramaster-os-remote-command-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-46169-cacti-command-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-40765-mitel-mivoice-connect-command-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41223-mitel-mivoice-connect-code-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-47986-ibm-aspera-faspex-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-36537-zk-framework-auuploader-unspecified-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-35914-teclib-glpi-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-33891-apache-spark-command-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-28810-zoho-manageengine-adselfservice-plus-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-41328-fortinet-fortios-path-traversal-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22706-arm-mali-gpu-kernel-driver-unspecified-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-3038-google-chromium-network-service-use-after-free-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-38181-arm-mali-gpu-kernel-driver-use-after-free-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-39197-fortra-cobalt-strike-teamserver-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-42948-fortra-cobalt-strike-user-interface-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-27926-synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-31199-netwrix-auditor-insecure-object-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-29303-solarview-compact-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22265-samsung-mobile-devices-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22071-qualcomm-multiple-chipsets-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-48618-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-38028-microsoft-windows-print-spooler-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-24816-osgeo-geoserver-jai-ext-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-2586-linux-kernel-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-22948-vmware-vcenter-server-incorrect-default-file-permissions-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-0185-linux-kernel-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-21445-oracle-adf-faces-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-23227-nuuo-nvrmini2-devices-missing-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-23748-dante-discovery-process-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-43939-hitachi-vantara-pentaho-ba-server-authorization-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-43769-hitachi-vantara-pentaho-ba-server-special-element-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-40799-d-link-dnr-322l-download-of-code-without-integrity-check-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-48503-apple-multiple-products-unspecified-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-37055-d-link-routers-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2022-20775-cisco-sd-wan-path-traversal-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-40539-zoho-manageengine-adselfservice-plus-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27561-yealink-device-management-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21985-vmware-vcenter-server-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21972-vmware-vcenter-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22005-vmware-vcenter-server-file-upload-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-36741-trend-micro-multiple-products-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-36742-trend-micro-multiple-products-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31755-tenda-ac11-router-stack-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20016-sonicwall-sslvpn-sma100-sql-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20023-sonicwall-email-security-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20022-sonicwall-email-security-unrestricted-upload-of-file-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20021-sonicwall-email-security-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-35211-solarwinds-serv-u-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-35395-realtek-ap-router-sdk-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1905-qualcomm-multiple-chipsets-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1906-qualcomm-multiple-chipsets-detection-of-error-condition-without-action-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22899-ivanti-pulse-connect-secure-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22894-ivanti-pulse-connect-secure-collaboration-suite-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22900-ivanti-pulse-connect-secure-unrestricted-file-upload-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22893-ivanti-pulse-connect-secure-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38648-microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-36955-microsoft-windows-common-log-file-system-clfs-driver-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26857-microsoft-exchange-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-34448-microsoft-windows-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1675-microsoft-windows-print-spooler-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27065-microsoft-exchange-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26858-microsoft-exchange-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26855-microsoft-exchange-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27059-microsoft-office-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27085-microsoft-internet-explorer-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-36942-microsoft-windows-local-security-authority-lsa-spoofing-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-40444-microsoft-mshtml-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26411-microsoft-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-28310-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31207-microsoft-exchange-server-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-34527-microsoft-windows-print-spooler-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1732-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-34473-microsoft-exchange-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38649-microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-36948-microsoft-windows-update-medic-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-34523-microsoft-exchange-server-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38645-microsoft-open-management-infrastructure-omi-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31979-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31201-microsoft-enhanced-cryptographic-provider-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31956-microsoft-windows-ntfs-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-33771-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31199-microsoft-enhanced-cryptographic-provider-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-33742-microsoft-windows-mshtml-platform-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-33739-microsoft-desktop-window-manager-dwm-core-library-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1647-microsoft-defender-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31955-microsoft-windows-kernel-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38647-microsoft-open-management-infrastructure-omi-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22502-micro-focus-operation-bridge-report-obr-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22506-micro-focus-access-manager-information-leakage-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-23874-mcafee-total-protection-mtp-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30116-kaseya-virtual-system-server-administrator-vsa-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30563-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21220-google-chromium-v8-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21193-google-chromium-blink-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21224-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38003-google-chromium-v8-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38000-google-chromium-intents-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21206-google-chromium-blink-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30554-google-chromium-webgl-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-37975-google-chromium-v8-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30551-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-37973-google-chromium-portals-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21148-google-chromium-v8-heap-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30633-google-chromium-indexed-db-api-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30632-google-chromium-v8-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-37976-google-chromium-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21166-google-chromium-race-condition-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-35464-forgerock-access-management-am-core-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22986-f5-big-ip-and-big-iq-centralized-management-icontrol-rest-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22205-gitlab-community-and-enterprise-editions-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1498-cisco-hyperflex-hx-data-platform-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1497-cisco-hyperflex-hx-installer-virtual-machine-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-42258-bqe-billquick-web-suite-sql-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26084-atlassian-confluence-server-and-data-center-object-graph-navigation-language-ognl-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-28663-arm-mali-graphics-processing-unit-gpu-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-28664-arm-mali-graphics-processing-unit-gpu-unspecified-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27562-arm-trusted-firmware-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20090-arcadyan-buffalo-firmware-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30869-apple-ios-ipados-and-macos-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30761-apple-ios-webkit-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30663-apple-multiple-products-webkit-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30665-apple-multiple-products-webkit-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30657-apple-macos-unspecified-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30713-apple-macos-unspecified-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30666-apple-ios-webkit-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30661-apple-multiple-products-webkit-storage-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1879-apple-ios-ipados-and-watchos-webkit-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1871-apple-ios-ipados-and-macos-webkit-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1870-apple-ios-ipados-and-macos-webkit-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1782-apple-multiple-products-race-condition-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30762-apple-ios-webkit-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30807-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30860-apple-multiple-products-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30858-apple-ios-ipados-macos-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-41773-apache-http-server-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-42013-apache-http-server-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-28550-adobe-acrobat-and-reader-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21017-adobe-acrobat-and-reader-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27103-accellion-fta-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27101-accellion-fta-sql-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27102-accellion-fta-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27104-accellion-fta-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-42292-microsoft-excel-security-feature-bypass</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-42321-microsoft-exchange-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-40449-microsoft-windows-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22204-exiftool-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-44077-zoho-manageengine-servicedesk-plus-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-40438-apache-http-server-side-request-forgery-ssrf</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-37415-zoho-manageengine-servicedesk-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-44228-apache-log4j2-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-44168-fortinet-fortios-arbitrary-file-download</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-35394-realtek-jungle-sdk-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-44515-zoho-desktop-central-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-4102-google-chromium-v8-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-43890-microsoft-windows-appx-installer-spoofing-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27860-fatpipe-warp-ipvpn-and-mpvpn-configuration-upload-exploit</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-36260-hikvision-improper-input-validation</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22017-vmware-vcenter-server-improper-access-control</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22991-f5-big-ip-traffic-management-microkernel-buffer-overflow</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21315-system-information-library-for-node-js-command-injection</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21975-vmware-server-side-request-forgery-in-vrealize-operations-manager-api</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-33766-microsoft-exchange-server-information-disclosure</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-40870-aviatrix-controller-unrestricted-upload-of-file</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25298-nagios-xi-os-command-injection</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25297-nagios-xi-os-command-injection</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25296-nagios-xi-os-command-injection</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-32648-october-cms-improper-authentication</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-35247-solarwinds-serv-u-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20038-sonicwall-sma-100-appliances-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-36934-microsoft-windows-sam-local-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-41379-microsoft-windows-installer-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21973-vmware-vcenter-server-and-cloud-foundation-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22941-citrix-sharefile-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-42237-sitecore-xp-remote-command-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20028-sonicwall-secure-remote-access-sra-sql-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26085-atlassian-confluence-server-pre-authorization-arbitrary-file-read-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-34486-microsoft-windows-event-tracing-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38646-microsoft-office-access-connectivity-engine-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21551-dell-dbutil-driver-insufficient-access-control-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-28799-qnap-nas-improper-authorization-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-34484-microsoft-windows-user-profile-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-45382-d-link-multiple-routers-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31166-microsoft-http-protocol-stack-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-3156-sudo-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22600-linux-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27852-checkbox-survey-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-39793-google-pixel-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-42278-microsoft-active-directory-domain-services-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-42287-microsoft-active-directory-domain-services-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-40450-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-41357-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1789-apple-multiple-products-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30883-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-0920-android-kernel-race-condition-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-1048-android-kernel-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38163-sap-netweaver-unrestricted-file-upload-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30983-apple-ios-and-ipados-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-4034-red-hat-polkit-out-of-bounds-read-and-write-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30533-google-chromium-popupblocker-security-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31010-apple-ios-macos-watchos-sandbox-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-38406-delta-electronics-dopsoft-2-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-39226-grafana-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-3493-linux-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25370-samsung-mobile-devices-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25369-samsung-mobile-devices-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25337-samsung-mobile-devices-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-35587-oracle-fusion-middleware-unspecified-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-39144-xstream-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30900-apple-ios-ipados-and-macos-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27878-veritas-backup-exec-agent-command-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27877-veritas-backup-exec-agent-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-27876-veritas-backup-exec-agent-file-access-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-45046-apache-log4j2-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-3560-red-hat-polkit-incorrect-authorization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-44026-roundcube-webmail-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25372-samsung-mobile-devices-improper-boundary-check-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25371-samsung-mobile-devices-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25395-samsung-mobile-devices-race-condition-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25394-samsung-mobile-devices-race-condition-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25489-samsung-mobile-devices-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-25487-samsung-mobile-devices-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-29256-arm-mali-gpu-kernel-driver-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-3129-laravel-ignition-file-upload-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-36380-sunhillo-sureline-os-command-injection-vulnerablity</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-44529-ivanti-endpoint-manager-cloud-service-appliance-epm-csa-code-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-40655-d-link-dir-605-router-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-33044-dahua-ip-camera-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-33045-dahua-ip-camera-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-31196-microsoft-exchange-server-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20123-draytek-vigorconnect-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20124-draytek-vigorconnect-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-41277-metabase-geojson-api-local-file-inclusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26086-atlassian-jira-server-and-data-center-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-40407-reolink-rlc-410w-ip-camera-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-44207-acclaim-systems-usaherds-use-of-hard-coded-credentials-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-20035-sonicwall-sma100-appliances-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-32030-asus-routers-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-21311-adminer-server-side-request-forgery-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-43226-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22555-linux-kernel-heap-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-43798-grafana-path-traversal-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26829-openplc-scadabr-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-26828-openplc-scadabr-unrestricted-upload-of-file-with-dangerous-type-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-39935-gitlab-community-and-enterprise-editions-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22175-gitlab-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-30952-apple-multiple-products-integer-overflow-or-wraparound-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22681-rockwell-multiple-products-insufficient-protected-credentials-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2021-22054-omnissa-workspace-one-server-side-request-forgery</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-29583-zyxel-multiple-products-use-of-hard-coded-credentials-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-10189-zoho-manageengine-desktop-central-file-upload-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-11738-wordpress-snap-creek-duplicator-plugin-file-download-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-25213-wordpress-file-manager-plugin-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-4006-multiple-vmware-products-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3952-vmware-vcenter-server-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3950-vmware-multiple-products-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3992-vmware-esxi-openslp-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-17496-vbulletin-php-module-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-5847-unraid-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-5849-unraid-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8599-trend-micro-apex-one-and-officescan-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-24557-trend-micro-multiple-products-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8468-trend-micro-multiple-products-content-validation-escape-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8467-trend-micro-apex-one-and-officescan-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-10987-tenda-ac1900-router-ac15-model-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-10181-sumavision-emr-cross-site-request-forgery-csrf-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-12271-sophos-sfos-sql-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-10199-sonatype-nexus-repository-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-10148-solarwinds-orion-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-6207-sap-solution-manager-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-6287-sap-netweaver-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-16846-saltstack-salt-shell-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-11651-saltstack-salt-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-11652-saltstack-salt-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-10221-rconfig-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8260-ivanti-pulse-connect-secure-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8243-ivanti-pulse-connect-secure-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8644-playsms-server-side-template-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-14883-oracle-weblogic-server-unspecified-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-14882-oracle-weblogic-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-14750-oracle-weblogic-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-14871-oracle-solaris-and-zettabyte-file-system-zfs-unspecified-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-2555-oracle-multiple-products-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-26919-netgear-jgs516pe-devices-missing-function-level-access-control-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-6820-mozilla-firefox-and-thunderbird-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-6819-mozilla-firefox-and-thunderbird-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1147-microsoft-net-framework-sharepoint-and-visual-studio-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0646-microsoft-net-framework-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0601-microsoft-windows-cryptoapi-spoofing-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1054-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1472-microsoft-netlogon-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0968-microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1380-microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0674-microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1350-microsoft-windows-dns-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1040-microsoft-hyper-v-remotefx-vgpu-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1464-microsoft-windows-spoofing-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0688-microsoft-exchange-server-validation-key-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1020-microsoft-windows-adobe-font-manager-library-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0986-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-17144-microsoft-exchange-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0938-microsoft-windows-adobe-font-manager-library-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-17087-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0683-microsoft-windows-installer-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0878-microsoft-edge-and-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-7961-liferay-portal-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-15505-ivanti-mobileiron-multiple-products-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-4428-ibm-data-risk-manager-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-4427-ibm-data-risk-manager-security-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-4430-ibm-data-risk-manager-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-6418-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-16013-google-chromium-v8-incorrect-implementation-vulnerabililty</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-16009-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-16017-google-chrome-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-15999-google-chrome-freetype-heap-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-16010-google-chrome-for-android-ui-heap-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-12812-fortinet-fortios-ssl-vpn-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-5902-f5-big-ip-traffic-management-user-interface-tmui-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8655-eyesofnetwork-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8657-eyesofnetwork-use-of-hard-coded-credentials-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8515-multiple-draytek-vigor-routers-web-management-page-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-25506-d-link-dns-320-device-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-29557-d-link-dir-825-r1-devices-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8196-citrix-adc-gateway-and-sd-wan-wanop-appliance-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8195-citrix-adc-gateway-and-sd-wan-wanop-appliance-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8193-citrix-adc-gateway-and-sd-wan-wanop-appliance-authorization-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3161-cisco-ip-phones-web-server-remote-code-execution-and-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3569-cisco-ios-xr-software-dvmrp-memory-exhaustion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3566-cisco-ios-xr-software-dvmrp-memory-exhaustion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3118-cisco-ios-xr-software-discovery-protocol-format-string-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3580-cisco-asa-and-ftd-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3452-cisco-asa-and-ftd-read-only-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-9859-apple-multiple-products-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-9819-apple-ios-ipados-and-watchos-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-9818-apple-ios-ipados-and-watchos-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-27932-apple-multiple-products-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-27950-apple-multiple-products-memory-initialization-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-27930-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-17530-apache-struts-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0069-mediatek-multiple-chipsets-insufficient-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0041-android-kernel-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-5735-amcrest-cameras-and-nvr-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-11261-qualcomm-multiple-chipsets-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8816-pi-hole-adminlte-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-17463-fuel-cms-sql-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-6572-google-chrome-media-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-13927-apache-airflow-s-experimental-api-authentication-bypass</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-11978-apache-airflow-command-injection</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-13671-drupal-core-un-restricted-upload-of-file</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-14864-oracle-business-intelligence-enterprise-edition-path-transversal</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0787-microsoft-windows-background-intelligent-transfer-service-bits-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-5722-grandstream-networks-ucm6200-series-sql-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0796-microsoft-smbv3-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-11899-treck-tcp-ip-stack-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1938-apache-tomcat-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-8218-pulse-connect-secure-code-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-5135-sonicwall-sonicos-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1631-juniper-junos-os-path-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1956-apache-kylin-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-2021-palo-alto-networks-pan-os-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-2506-qnap-helpdesk-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-25223-sophos-sg-utm-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-5410-vmware-tanzu-spring-cloud-config-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-7247-opensmtpd-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-9054-zyxel-multiple-nas-devices-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-9377-d-link-dir-610-devices-remote-command-execution</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-2509-qnap-network-attached-storage-nas-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0638-microsoft-update-notification-manager-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-1027-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-9907-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3837-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-28949-pear-archive-tar-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-36193-pear-archive-tar-improper-link-resolution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-9934-apple-ios-ipados-and-macos-input-validation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3153-cisco-anyconnect-secure-mobility-client-for-windows-uncontrolled-search-path-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3433-cisco-anyconnect-secure-mobility-client-for-windows-dll-hijacking-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-5741-plex-media-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-12641-roundcube-webmail-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-35730-roundcube-webmail-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-2551-oracle-fusion-middleware-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-3259-cisco-asa-and-ftd-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-17519-apache-flink-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-13965-roundcube-webmail-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-0618-microsoft-sql-server-reporting-services-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-14644-oracle-weblogic-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-15415-draytek-multiple-vigor-routers-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-2883-oracle-weblogic-server-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-11023-jquery-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-29574-cyberoamos-cros-sql-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-15069-sophos-xg-firewall-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-25079-d-link-dcs-2530l-and-dcs-2670l-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-25078-d-link-dcs-2530l-and-dcs-2670l-devices-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-24363-tp-link-tl-wa855re-missing-authentication-for-critical-function-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2020-7796-synacor-zimbra-collaboration-suite-zcs-server-side-request-forgery-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-8394-zoho-manageengine-servicedesk-plus-sdp-file-upload-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-9978-wordpress-social-warfare-plugin-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-5544-vmware-esxi-and-horizon-daas-openslp-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-16759-vbulletin-php-module-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-20085-tvt-nvms-1000-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-18187-trend-micro-officescan-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-9082-thinkphp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-18988-teamviewer-desktop-bypass-remote-login-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7481-sonicwall-sma100-sql-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-16256-simalliance-toolbox-browser-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11539-ivanti-pulse-connect-secure-and-policy-secure-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11510-ivanti-pulse-connect-secure-arbitrary-file-read-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-18935-progress-telerik-ui-for-asp-net-ajax-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-19356-netis-wf2419-devices-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-15949-nagios-xi-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-17026-mozilla-firefox-and-thunderbird-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0863-microsoft-windows-error-reporting-wer-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1214-microsoft-windows-privilege-common-log-file-system-clfs-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0808-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0604-microsoft-sharepoint-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1429-microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1367-microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0541-microsoft-mshtml-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1215-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0797-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0859-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0803-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0708-microsoft-remote-desktop-services-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-4716-ibm-planning-analytics-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-5591-fortinet-fortios-default-configuration-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-15752-docker-desktop-community-edition-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11634-citrix-workspace-application-and-receiver-for-windows-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-19781-citrix-adc-gateway-and-sd-wan-wanop-appliance-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-13608-citrix-storefront-server-xml-external-entity-xxe-processing-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1653-cisco-small-business-rv320-and-rv325-routers-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-3396-atlassian-confluence-server-and-data-center-server-side-template-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11580-atlassian-crowd-and-crowd-data-center-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-3398-atlassian-confluence-server-and-data-center-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-6223-apple-ios-and-macos-group-facetime-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-17558-apache-solr-velocityresponsewriter-plug-in-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0211-apache-http-server-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-2215-android-kernel-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-10758-mongodb-mongo-express-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0193-apache-solr-dataimporthandler-code-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7238-sonatype-nexus-repository-manager-incorrect-access-control-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-13272-linux-kernel-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7609-kibana-arbitrary-code-execution</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-10149-exim-mail-transfer-agent-mta-improper-input-validation</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1579-palo-alto-networks-pan-os-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-9670-synacor-zimbra-collaboration-suite-zcs-improper-restriction-of-xml-external-entity-reference</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-2725-oracle-weblogic-server-injection</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1458-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0752-microsoft-internet-explorer-type-confusion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1297-microsoft-excel-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1652-cisco-small-business-routers-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-16928-exim-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11581-atlassian-jira-server-and-data-center-server-side-template-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0543-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0841-microsoft-windows-appx-deployment-service-appxsvc-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1064-microsoft-windows-appx-deployment-service-appxsvc-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1069-microsoft-task-scheduler-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1129-microsoft-windows-appx-deployment-service-appxsvc-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1132-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1253-microsoft-windows-appx-deployment-server-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1315-microsoft-windows-error-reporting-manager-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1322-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1405-microsoft-windows-universal-plug-and-play-upnp-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0903-microsoft-gdi-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1003030-jenkins-matrix-project-plugin-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-10068-kentico-xperience-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11043-php-fastcgi-process-manager-fpm-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-12989-citrix-sd-wan-and-netscaler-sql-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-12991-citrix-sd-wan-and-netscaler-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-15107-webmin-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-16920-d-link-multiple-routers-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-2616-oracle-bi-publisher-unauthorized-access-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-6340-drupal-core-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7483-sonicwall-sma100-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-16057-d-link-dns-320-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-3929-crestron-multiple-products-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-3568-whatsapp-voip-stack-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1003029-jenkins-script-security-plugin-sandbox-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-8506-apple-multiple-products-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1130-microsoft-windows-appx-deployment-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1385-microsoft-windows-appx-deployment-extensions-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-18426-whatsapp-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-8720-webkitgtk-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11708-mozilla-firefox-and-thunderbird-sandbox-escape-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11707-mozilla-firefox-and-thunderbird-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-13720-google-chrome-webaudio-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0880-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0703-microsoft-windows-smb-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-5786-google-chrome-blink-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0676-microsoft-internet-explorer-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7287-apple-ios-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7286-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-3010-oracle-solaris-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-15271-cisco-rv-series-routers-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-5825-google-chromium-v8-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7192-qnap-photo-station-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7193-qnap-qts-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7194-qnap-photo-station-path-traversal-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7195-qnap-photo-station-path-traversal-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-8605-apple-multiple-products-use-after-free-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-1388-microsoft-windows-certificate-dialog-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-8526-apple-macos-use-after-free-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-20500-d-link-dwl-2600ap-access-point-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-17621-d-link-dir-859-router-command-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-7256-nice-linear-emerge-e3-series-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-0344-sap-commerce-cloud-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-16278-nostromo-nhttpd-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-11001-reolink-multiple-ip-cameras-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-9874-sitecore-cms-and-experience-platform-xp-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-9875-sitecore-cms-and-experience-platform-xp-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-6693-fortinet-fortios-use-of-hard-coded-credentials-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-5418-rails-ruby-on-rails-path-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-9621-synacor-zimbra-collaboration-suite-zcs-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2019-19006-sangoma-freepbx-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-20062-thinkphp-nonecms-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-14558-tenda-ac7-ac9-and-ac10-routers-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-2380-sap-customer-relationship-management-crm-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0802-microsoft-office-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0798-microsoft-office-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8653-microsoft-internet-explorer-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-13379-fortinet-fortios-ssl-vpn-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-6789-exim-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-7600-drupal-core-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-18325-dotnetnuke-dnn-inadequate-encryption-strength-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-15811-dotnetnuke-dnn-inadequate-encryption-strength-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0296-cisco-adaptive-security-appliance-asa-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0171-cisco-ios-and-ios-xe-software-smart-install-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-11776-apache-struts-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-4878-adobe-flash-player-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-15961-adobe-coldfusion-unrestricted-file-upload-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-4939-adobe-coldfusion-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-14847-mikrotik-router-os-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-13383-fortinet-fortios-and-fortiproxy-out-of-bounds-write</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-13382-fortinet-fortios-and-fortiproxy-improper-authorization</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8453-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-1000861-jenkins-stapler-web-framework-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-15982-adobe-flash-player-use-after-free-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-20250-winrar-absolute-path-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8174-microsoft-windows-vbscript-engine-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0151-cisco-ios-software-and-cisco-ios-xe-software-quality-of-service-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0154-cisco-ios-software-integrated-services-module-for-vpn-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0155-cisco-catalyst-bidirectional-forwarding-detection-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0156-cisco-ios-software-and-cisco-ios-xe-software-smart-install-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0158-cisco-ios-and-xe-software-internet-key-exchange-memory-leak-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0159-cisco-ios-and-xe-software-internet-key-exchange-version-1-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0161-cisco-ios-software-resource-management-errors-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0167-cisco-ios-xr-and-xe-software-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0172-cisco-ios-and-ios-xe-software-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0173-cisco-ios-and-ios-xe-software-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0174-cisco-ios-software-and-cisco-ios-xe-software-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0175-cisco-ios-xr-and-xe-software-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0179-cisco-ios-software-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0180-cisco-ios-software-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8298-chakracore-scripting-engine-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8581-microsoft-exchange-server-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8120-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0125-cisco-vpn-routers-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0147-cisco-secure-access-control-system-java-deserialization-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-11138-quest-kace-system-management-appliance-remote-command-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-1273-vmware-tanzu-spring-data-commons-property-binder-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-14839-lg-n1a1-nas-remote-command-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-6961-vmware-sd-wan-edge-by-velocloud-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8373-microsoft-scripting-engine-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8414-microsoft-windows-shell-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8405-microsoft-directx-graphics-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8406-microsoft-directx-graphics-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8440-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-10561-dasan-gpon-routers-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-10562-dasan-gpon-routers-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-20753-kaseya-vsa-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-7602-drupal-core-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-7841-schneider-electric-u-motion-builder-sql-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-6882-synacor-zimbra-collaboration-suite-zcs-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8589-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-5002-adobe-flash-player-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-19943-qnap-nas-file-station-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-19949-qnap-nas-file-station-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-19953-qnap-nas-file-station-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8611-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-17463-google-chromium-v8-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-17480-google-chromium-v8-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-4990-adobe-acrobat-and-reader-double-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-6065-google-chromium-v8-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-4344-apple-multiple-products-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-13374-fortinet-fortios-and-fortiadc-improper-access-control-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-2628-oracle-weblogic-server-unspecified-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-6530-d-link-multiple-routers-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-7445-mikrotik-routeros-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-19320-gigabyte-multiple-products-unspecified-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-19321-gigabyte-multiple-products-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-19322-gigabyte-multiple-products-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-19323-gigabyte-multiple-products-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-18809-tibco-jasperreports-library-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-5430-tibco-jasperreports-server-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-14667-red-hat-jboss-richfaces-framework-expression-language-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-15133-laravel-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-0824-microsoft-com-for-windows-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-14933-nuuo-nvrmini-devices-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-9276-paessler-prtg-network-monitor-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-19410-paessler-prtg-network-monitor-local-file-inclusion-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-8639-microsoft-windows-win32k-improper-resource-shutdown-or-release-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-4063-sierra-wireless-airlink-aleos-unrestricted-upload-of-file-with-dangerous-type-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2018-14634-linux-kernel-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-9248-progress-telerik-ui-for-asp-net-ajax-and-sitefinity-cryptographic-weakness-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6327-symantec-messaging-gateway-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-16651-roundcube-webmail-file-disclosure-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-11774-microsoft-office-outlook-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0199-microsoft-office-and-wordpad-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-11882-microsoft-office-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-8759-microsoft-net-framework-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0143-microsoft-windows-server-message-block-smbv1-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-7269-microsoft-windows-server-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-9822-dotnetnuke-dnn-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-5638-apache-struts-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-9805-apache-struts-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12149-red-hat-jboss-application-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-17562-embedthis-goahead-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-1000486-primetek-primefaces-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-5689-intel-active-management-technology-amt-small-business-technology-sbt-and-standard-manageability-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0144-microsoft-smbv1-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0145-microsoft-smbv1-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0262-microsoft-office-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0263-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-10271-oracle-corporation-weblogic-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-8464-microsoft-windows-shell-lnk-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-9791-apache-struts-1-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-9841-phpunit-command-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0222-microsoft-internet-explorer-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-8570-microsoft-office-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0001-microsoft-graphics-device-interface-gdi-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0261-microsoft-office-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-11292-adobe-flash-player-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-11826-microsoft-office-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12231-cisco-ios-software-network-address-translation-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12232-cisco-ios-software-for-cisco-integrated-services-routers-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12233-cisco-ios-software-common-industrial-protocol-request-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12234-cisco-ios-software-common-industrial-protocol-request-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12235-cisco-ios-software-for-cisco-industrial-ethernet-switches-profinet-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12237-cisco-ios-and-ios-xe-software-internet-key-exchange-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12238-cisco-catalyst-6800-series-switches-vpls-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12240-cisco-ios-and-ios-xe-software-dhcp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12319-cisco-ios-xe-software-ethernet-virtual-private-network-border-gateway-protocol-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6627-cisco-ios-software-and-cisco-ios-xe-software-udp-packet-processing-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6663-cisco-ios-software-and-cisco-ios-xe-software-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6736-cisco-ios-and-ios-xe-software-snmp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6737-cisco-ios-and-ios-xe-software-snmp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6738-cisco-ios-and-ios-xe-software-snmp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6739-cisco-ios-and-ios-xe-software-snmp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6740-cisco-ios-and-ios-xe-software-snmp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6743-cisco-ios-and-ios-xe-software-snmp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6744-cisco-ios-software-snmp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-8540-microsoft-malware-protection-engine-improper-restriction-of-operations-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6077-netgear-dgn2200-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0101-microsoft-windows-transaction-manager-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0146-microsoft-windows-smb-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12615-apache-tomcat-on-windows-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12617-apache-tomcat-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-3881-cisco-ios-and-ios-xe-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6316-citrix-multiple-products-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6334-netgear-dgn2200-devices-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0037-microsoft-edge-and-internet-explorer-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0059-microsoft-internet-explorer-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0213-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0148-microsoft-smbv1-server-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-11317-telerik-ui-for-asp-net-ajax-unrestricted-file-upload-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-18362-kaseya-vsa-sql-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-8543-microsoft-windows-search-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-8291-artifex-ghostscript-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0210-microsoft-internet-explorer-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0149-microsoft-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0005-microsoft-windows-graphics-device-interface-gdi-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0022-microsoft-xml-core-services-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-0147-microsoft-windows-smbv1-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-5030-google-chromium-v8-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-5070-google-chromium-v8-type-confusion-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6862-netgear-multiple-devices-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-15944-palo-alto-networks-pan-os-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-5521-netgear-multiple-devices-exposure-of-sensitive-information-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-11357-telerik-ui-for-asp-net-ajax-insecure-direct-object-reference-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-7494-samba-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6742-cisco-ios-and-ios-xe-software-snmp-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-18368-zyxel-p660hn-t1a-routers-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-6884-zyxel-emg2926-routers-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-3506-oracle-weblogic-server-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-1000253-linux-kernel-pie-stack-buffer-corruption-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-3066-adobe-coldfusion-deserialization-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-12637-sap-netweaver-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-1000353-jenkins-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2017-7921-hikvision-multiple-products-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3643-solarwinds-virtualization-manager-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3976-sap-netweaver-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-9563-sap-netweaver-xml-external-entity-xxe-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3235-microsoft-office-ole-dll-side-loading-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7255-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0185-microsoft-windows-media-center-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0167-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3718-imagemagick-server-side-request-forgery-ssrf-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3715-imagemagick-arbitrary-file-deletion-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-4437-apache-shiro-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3088-apache-activemq-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0099-microsoft-windows-secondary-logon-service-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-1019-adobe-flash-player-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-4117-adobe-flash-player-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-5195-linux-kernel-race-condition-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7193-microsoft-office-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7262-microsoft-office-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7855-adobe-flash-player-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-8562-siemens-simatic-cp-1543-1-improper-privilege-management-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-6277-netgear-multiple-routers-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3309-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0752-ruby-on-rails-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-10174-netgear-wnr2000v5-router-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-11021-d-link-dcs-930l-devices-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-1555-netgear-multiple-wap-devices-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-4171-adobe-flash-player-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7892-adobe-flash-player-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0040-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0151-microsoft-windows-csrss-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0189-microsoft-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7200-microsoft-edge-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7201-microsoft-edge-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-4523-trihedral-vtscada-formerly-vts-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3298-microsoft-internet-explorer-messaging-api-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-6367-cisco-adaptive-security-appliance-asa-cli-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-6366-cisco-adaptive-security-appliance-asa-snmp-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-4657-apple-ios-webkit-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-4656-apple-ios-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-4655-apple-ios-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3351-microsoft-internet-explorer-and-edge-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0162-microsoft-internet-explorer-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0034-microsoft-silverlight-runtime-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0984-adobe-flash-player-and-air-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-1010-adobe-flash-player-and-air-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7256-microsoft-windows-open-type-font-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3393-microsoft-windows-graphics-device-interface-gdi-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-1646-google-chromium-v8-out-of-bounds-read-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-5198-google-chromium-v8-out-of-bounds-memory-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-2388-sap-netweaver-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-2386-sap-netweaver-sql-injection-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-8735-apache-tomcat-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3427-oracle-java-se-and-jrockit-unspecified-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-6415-cisco-ios-ios-xr-and-ios-xe-ikev1-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-0165-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-9079-mozilla-firefox-firefox-esr-and-thunderbird-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-20017-d-link-dsl-2750b-devices-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-3714-imagemagick-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-10033-phpmailer-command-injection-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2016-7836-skysea-client-view-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-4852-oracle-weblogic-server-deserialization-of-untrusted-data-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1641-microsoft-office-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-7450-ibm-websphere-application-server-and-server-hypervisor-edition-code-injection</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1130-apple-os-x-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1635-microsoft-http-sys-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2051-d-link-dir-645-router-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1642-microsoft-office-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1701-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2387-microsoft-atm-font-driver-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2424-microsoft-powerpoint-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2545-microsoft-office-malformed-eps-file-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2590-oracle-java-se-and-java-se-embedded-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-3043-adobe-flash-player-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-4902-oracle-java-se-integrity-check-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-5119-adobe-flash-player-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-7645-adobe-flash-player-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2546-microsoft-win32k-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-0666-cisco-prime-data-center-network-manager-dcnm-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1187-d-link-and-trendnet-multiple-devices-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1427-elasticsearch-groovy-scripting-engine-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-3035-tp-link-multiple-archer-devices-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-4068-arcserve-unified-data-protection-udp-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1770-microsoft-office-uninitialized-memory-use-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2419-microsoft-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2426-microsoft-windows-adobe-type-manager-library-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-0311-adobe-flash-player-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-0313-adobe-flash-player-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2502-microsoft-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-3113-adobe-flash-player-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-5122-adobe-flash-player-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-5123-adobe-flash-player-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1671-microsoft-windows-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-6175-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-8651-adobe-flash-player-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-4495-mozilla-firefox-security-feature-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-1769-microsoft-windows-mount-manager-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2425-microsoft-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2360-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-0071-microsoft-internet-explorer-aslr-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-0016-microsoft-windows-ts-webproxy-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-0310-adobe-flash-player-aslr-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-2291-intel-ethernet-diagnostics-driver-for-windows-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-5317-jenkins-user-interface-ui-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2015-7755-juniper-screenos-improper-authentication-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-1812-microsoft-windows-group-policy-preferences-password-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-7169-gnu-bourne-again-shell-bash-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-6271-gnu-bourne-again-shell-bash-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-1776-microsoft-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-4404-apple-os-x-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-1761-microsoft-word-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-6352-microsoft-windows-code-injection-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0496-adobe-reader-and-acrobat-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-4114-microsoft-windows-object-linking-embedding-ole-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0130-ruby-on-rails-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-3120-elasticsearch-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-6287-rejetto-http-file-server-hfs-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-6324-microsoft-kerberos-key-distribution-center-kdc-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-6332-microsoft-windows-object-linking-embedding-ole-automation-array-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-9163-adobe-flash-player-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0780-indusoft-web-studio-ntwebserver-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0160-openssl-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0322-microsoft-internet-explorer-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-4113-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-3153-linux-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-4077-microsoft-ime-japanese-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-2817-microsoft-internet-explorer-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0546-adobe-reader-and-acrobat-sandbox-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-4123-microsoft-internet-explorer-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-8439-adobe-flash-player-dereferenced-pointer-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-4148-microsoft-windows-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0196-linux-kernel-race-condition-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-8361-realtek-sdk-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-100005-d-link-dir-600-router-cross-site-request-forgery-csrf-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0497-adobe-flash-player-integer-underflow-vulnerablity</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-0502-adobe-flash-player-double-free-vulnerablity</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-2120-cisco-adaptive-security-appliance-asa-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-3931-multi-router-looking-glass-mrlg-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2014-6278-gnu-bash-os-command-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3900-microsoft-winverifytrust-function-remote-code-execution</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3906-microsoft-graphics-component-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0632-adobe-coldfusion-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0640-adobe-reader-and-acrobat-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0641-adobe-reader-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-1347-microsoft-internet-explorer-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-1675-mozilla-firefox-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3346-adobe-reader-and-acrobat-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3897-microsoft-internet-explorer-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-5065-microsoft-windows-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0625-adobe-coldfusion-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0629-adobe-coldfusion-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0631-adobe-coldfusion-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-2251-apache-struts-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-4810-hp-multiple-products-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-5223-d-link-dsl-2760u-gateway-cross-site-scripting-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-1690-mozilla-firefox-and-thunderbird-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-2465-oracle-java-se-unspecified-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-2551-microsoft-internet-explorer-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-2729-adobe-reader-and-acrobat-arbitrary-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3660-microsoft-win32k-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0074-microsoft-silverlight-double-dereference-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0422-oracle-jre-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0431-oracle-jre-sandbox-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-2423-oracle-jre-unspecified-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3896-microsoft-silverlight-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3993-ibm-infosphere-biginsights-invalid-input-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-7331-microsoft-internet-explorer-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-1331-microsoft-office-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-2094-linux-kernel-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-2596-linux-kernel-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-2597-code-aurora-acdb-audio-driver-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-6282-linux-kernel-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3163-microsoft-internet-explorer-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0643-adobe-flash-player-incorrect-default-permissions-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-0648-adobe-flash-player-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3893-microsoft-internet-explorer-resource-management-errors-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2013-3918-microsoft-windows-out-of-bounds-write-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-3152-oracle-fusion-middleware-unspecified-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-0158-microsoft-mscomctl-ocx-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-0391-apache-struts-2-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-0507-oracle-java-se-runtime-environment-jre-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-1535-adobe-flash-player-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-1723-oracle-java-se-runtime-environment-jre-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-1856-microsoft-office-mscomctl-ocx-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-4681-oracle-java-se-runtime-environment-jre-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-1823-php-cgi-query-string-parameter-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-0518-oracle-fusion-middleware-unspecified-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-2034-adobe-flash-player-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-2539-microsoft-word-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-5076-oracle-java-se-sandbox-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-1710-oracle-fusion-middleware-unspecified-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-0151-microsoft-windows-authenticode-signature-verification-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-0754-adobe-flash-player-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-0767-adobe-flash-player-cross-site-scripting-xss-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-1889-microsoft-xml-core-services-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-4969-microsoft-internet-explorer-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-5054-adobe-flash-player-integer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2012-4792-microsoft-internet-explorer-use-after-free-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-0611-adobe-flash-player-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-1889-microsoft-forefront-tmg-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-3544-oracle-java-se-runtime-environment-jre-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-2005-microsoft-ancillary-function-driver-afd-sys-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-0609-adobe-flash-player-unspecified-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-2462-adobe-reader-and-acrobat-universal-3d-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-1823-android-os-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-4723-d-link-dir-300-router-cleartext-storage-of-a-password-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2011-3402-microsoft-windows-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-5326-sap-netweaver-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-1871-red-hat-linux-jboss-seam-2-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-0188-adobe-reader-and-acrobat-arbitrary-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-0232-microsoft-windows-kernel-exception-handler-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-3333-microsoft-office-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-2861-adobe-coldfusion-directory-traversal-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-3035-cisco-ios-xr-border-gateway-protocol-bgp-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-4344-exim-heap-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-4345-exim-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-4398-microsoft-windows-kernel-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-5330-ubiquiti-airos-command-injection-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-0738-red-hat-jboss-authentication-bypass-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-0840-oracle-jre-unspecified-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-1428-red-hat-jboss-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-1297-adobe-flash-player-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-2572-microsoft-powerpoint-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-2883-adobe-acrobat-and-reader-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-2568-microsoft-windows-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-3904-linux-kernel-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-3765-mozilla-multiple-products-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2010-3962-microsoft-internet-explorer-uninitialized-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-1123-microsoft-windows-improper-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-3129-microsoft-excel-featheader-record-memory-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-3960-adobe-blazeds-information-disclosure-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-0927-adobe-reader-and-adobe-acrobat-stack-based-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-1151-phpmyadmin-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-2055-cisco-ios-xr-border-gateway-protocol-bgp-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-0557-microsoft-office-object-record-corruption-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-0563-microsoft-office-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-1862-adobe-acrobat-and-reader-flash-player-unspecified-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-3953-adobe-acrobat-and-reader-universal-3d-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-4324-adobe-acrobat-and-reader-use-after-free-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2009-0556-microsoft-office-powerpoint-code-injection-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2008-2992-adobe-reader-and-acrobat-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2008-3431-oracle-virtualbox-insufficient-input-validation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2008-0655-adobe-acrobat-and-reader-unspecified-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2008-0015-microsoft-windows-video-activex-control-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2007-3010-alcatel-omnipcx-enterprise-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2007-5659-adobe-acrobat-and-reader-buffer-overflow-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2007-0671-microsoft-office-excel-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2006-1547-apache-struts-1-actionform-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-05</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2006-2492-microsoft-word-malformed-object-pointer-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2005-2773-hp-openview-network-node-manager-remote-code-execution-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2004-0210-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2004-1464-cisco-ios-denial-of-service-vulnerability</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberflow.beyazhacker.com/cve/cve-2002-0367-microsoft-windows-privilege-escalation-vulnerability</loc>
    <lastmod>2026-04-04</lastmod>
  </url>
</urlset>
