<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://vulns.leetcybersecurity.com/2025/12/05/react2shell-remote-code-execution-in-react-server-components-rsc/</loc><lastmod>2025-12-06T13:44:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2025/11/14/fortiweb-path-traversal-authentication-bypass-and-admin-user-creation-exploited-in-the-wild/</loc><lastmod>2025-11-14T16:03:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2025/09/17/high-risk-npm-supply-chain-compromise/</loc><lastmod>2025-09-17T15:16:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2025/07/22/critical-sharepoint-zero-day-under-widespread-attack/</loc><lastmod>2025-07-22T13:54:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2024/08/20/windows-remote-desktop-licensing-service-madlicense-0-clickrce-affecting-all-windows-servers-2000-2025-cve-2024-38077/</loc><lastmod>2024-08-20T15:55:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2024/05/31/vulnerability-in-check-point-security-gateway-cve-2024-24919-path-traversal-and-arbitrary-file-read/</loc><lastmod>2024-05-31T14:40:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2024/04/12/vulnerability-in-globalprotect-feature-of-palo-alto-networks-pan-os-cve-2024-3400-os-command-injection/</loc><lastmod>2024-04-12T17:12:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2023/11/21/vulnerability-in-citrix-netscaler-adc-and-gateway-cve-2023-4966-citrix-bleed/</loc><lastmod>2023-11-21T18:20:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2023/11/09/temu-shopping-app-critical-vulnerability-and-security-threat-alert/</loc><lastmod>2023-11-09T18:42:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2023/11/09/microsoft-exchange-critical-vulnerability-alert-zdi-23-1578-zdi-23-1579-zdi-23-1580-zdi-23-1581/</loc><lastmod>2023-11-09T18:13:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2022/10/05/microsoft-exchange-critical-vulnerability-alert-cve-2022-41040-cve-2022-41082/</loc><lastmod>2022-10-05T17:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2022/10/05/privilege-escalation-vulnerability-in-windows-common-log-file-system-clfs-driver/</loc><lastmod>2022-10-05T17:17:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2022/06/09/follina-exploitation-of-windows-support-diagnostic-tool-cve-2022-30190/</loc><lastmod>2022-06-09T20:46:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2022/02/04/pwnkit-linux-rce-cve-2021-4034/</loc><lastmod>2022-02-04T17:26:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2021/12/10/log4j-remote-code-execution-cve-2021-44228/</loc><lastmod>2021-12-10T19:27:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2021/09/15/forcedentry-apple-device-vulnerability/</loc><lastmod>2021-09-15T17:20:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2021/01/13/zyxel-firewall-vulnerability/</loc><lastmod>2021-01-13T14:21:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2020/12/17/solarwinds-orion-supply-chain-attack/</loc><lastmod>2020-12-17T20:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2020/12/10/kerberos-bronze-bit-attack/</loc><lastmod>2020-12-10T22:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2020/10/19/sharepoint-critical-vulnerability-cve-2020-16952/</loc><lastmod>2020-10-19T19:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2020/10/19/bad-neighbor-cve-2020-16898/</loc><lastmod>2020-10-19T18:35:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2020/09/16/zerologon-netlogon-critical-vulnerability/</loc><lastmod>2020-09-16T15:48:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2020/08/19/apache-struts-critical-vulnerability/</loc><lastmod>2020-08-19T18:03:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/2020/08/10/teamviewer-critical-vulnerability/</loc><lastmod>2020-08-10T17:40:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulns.leetcybersecurity.com/about/</loc><lastmod>2020-08-10T17:37:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://vulns.leetcybersecurity.com/blog/</loc><lastmod>2020-08-10T17:25:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://vulns.leetcybersecurity.com/contact/</loc><lastmod>2020-08-10T17:15:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://vulns.leetcybersecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-12-06T13:44:45+00:00</lastmod></url></urlset>
