<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//threatpodium.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://threatpodium.com/threat-intelligence-report-2026-05-02/</loc>
		<lastmod>2026-05-02T20:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2009-0238-high-cvss-8-8-microsoft-office/</loc>
		<lastmod>2026-05-02T21:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2012-1854-high-cvss-7-8-microsoft-visual-basic-for-applications-vba/</loc>
		<lastmod>2026-05-02T21:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2020-9715-high-cvss-7-8-adobe-acrobat/</loc>
		<lastmod>2026-05-02T21:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2023-21529-high-cvss-8-8-microsoft-exchange-server/</loc>
		<lastmod>2026-05-02T21:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2023-27351-high-cvss-7-5-papercut-ng-mf/</loc>
		<lastmod>2026-05-02T21:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2023-36424-high-cvss-7-8-microsoft-windows/</loc>
		<lastmod>2026-05-02T21:29:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2024-27199-high-cvss-7-3-jetbrains-teamcity/</loc>
		<lastmod>2026-05-02T21:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2024-57726-critical-cvss-9-9-simplehelp-simplehelp/</loc>
		<lastmod>2026-05-02T21:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2024-57728-high-cvss-7-2-simplehelp-simplehelp/</loc>
		<lastmod>2026-05-02T21:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2024-7399-high-cvss-8-8-samsung-magicinfo-9-server/</loc>
		<lastmod>2026-05-02T21:29:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2025-2749-high-cvss-7-2-kentico-kentico-xperience/</loc>
		<lastmod>2026-05-02T21:29:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2025-29635-high-cvss-7-2-d-link-dir-823x/</loc>
		<lastmod>2026-05-02T21:29:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2025-32975-critical-cvss-10-0-quest-kace-systems-management-appliance-sma/</loc>
		<lastmod>2026-05-02T21:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2025-53521-critical-cvss-9-3-f5-big-ip/</loc>
		<lastmod>2026-05-02T21:29:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2025-60710-high-cvss-7-8-microsoft-windows/</loc>
		<lastmod>2026-05-02T21:29:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-1340-critical-cvss-9-8-ivanti-endpoint-manager-mobile-epmm/</loc>
		<lastmod>2026-05-02T21:29:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-20128-high-cvss-7-5-cisco-catalyst-sd-wan-manager/</loc>
		<lastmod>2026-05-02T21:29:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-21643-critical-cvss-9-8-fortinet-forticlient-ems/</loc>
		<lastmod>2026-05-02T21:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-3055-critical-cvss-9-3-citrix-netscaler/</loc>
		<lastmod>2026-05-02T21:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-33017-critical-cvss-9-3-langflow-langflow/</loc>
		<lastmod>2026-05-02T21:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-33634-critical-cvss-9-4-aquasecurity-trivy/</loc>
		<lastmod>2026-05-02T21:29:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-33825-high-cvss-7-8-microsoft-defender/</loc>
		<lastmod>2026-05-02T21:29:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-34197-high-cvss-8-8-apache-activemq/</loc>
		<lastmod>2026-05-02T21:29:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-34621-high-cvss-8-6-adobe-acrobat-and-reader/</loc>
		<lastmod>2026-05-02T21:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-3502-high-cvss-7-8-trueconf-client/</loc>
		<lastmod>2026-05-02T21:30:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-35616-critical-cvss-9-8-fortinet-forticlient-ems/</loc>
		<lastmod>2026-05-02T21:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-39987-critical-cvss-9-3-marimo-marimo/</loc>
		<lastmod>2026-05-02T21:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-5281-high-cvss-8-8-google-dawn/</loc>
		<lastmod>2026-05-02T21:30:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2024-1708-high-cvss-8-4-connectwise-screenconnect/</loc>
		<lastmod>2026-05-03T01:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-31431-high-cvss-7-8-linux-kernel/</loc>
		<lastmod>2026-05-03T01:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatpodium.com/cve-exploit-alert-cve-2026-41940-critical-cvss-9-3-webpros-cpanel-whm-and-wp2-wordpress-squared/</loc>
		<lastmod>2026-05-03T01:29:37+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->