<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://research.lyrie.ai/</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/about</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/authors/lyrie-threat-intelligence</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/streams/cve-deepdive</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/streams/active-exploitation</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/streams/research</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/streams/breaches</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/streams/originals</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/streams/agent-threats</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/cisa-kev</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/exploited-itw</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/microsoft</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/critical</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/windows</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CISA KEV</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/apple</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/cisco</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/adobe</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/multiple-products</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/google</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/oracle</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/apache</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/RCE</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/chromium-v8</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/internet-explorer</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ivanti</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/flash-player</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/linux</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/office</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/breach</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/kernel</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/d-link</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/fortinet</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/vmware</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/win32k</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Active Exploitation</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/citrix</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/research</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/synacor</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Path Traversal</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/exchange-server</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/samsung</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Privilege Escalation</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/android</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/sonicwall</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/coldfusion</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/sap</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/databreaches-net</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/mobile-devices</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/mozilla</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/palo-alto-networks</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/atlassian</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/arxiv-cs-cr</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Command Injection</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/qualcomm</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/zyxel</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CWE-22</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Deserialization</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/roundcube</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CWE-78</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/trend-micro</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/weblogic-server</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/qnap</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/agent-threats</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/solarwinds</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/netweaver</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/pan-os</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios-software</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CWE-502</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/vcenter-server</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/arm</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/zoho</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/rce</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/IoT</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Improper Authentication</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CWE-287</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/project-zero</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/juniper</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/fortios</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/progress</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/netgear</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/exim</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/bleepingcomputer</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/php</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/jenkins</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/D-Link</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/XSS</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Windows</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/f5</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/webmail</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/junos-os</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/mitel</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/sophos</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/red-hat</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ibm</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/java-se</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/lyrie-original</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Cisco</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/KEV</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/endpoint-manager-mobile-epmm</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/craft-cms</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/sharepoint</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/SSRF</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/chromium</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/OS Command Injection</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Linux Kernel</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/fusion-middleware</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/tp-link</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/multiple-routers</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/crushftp</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/adaptive-security-appliance-asa-and-firepower-threat-defense-ftd</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/mali-graphics-processing-unit-gpu</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/manageengine</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/firefox-and-thunderbird</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios-xr</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/dotnetnuke-dnn</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/simplehelp</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CWE-77</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CWE-94</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Apple</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/web-help-desk</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/endpoint-manager-epm</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios-and-ipados</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Remote Code Execution</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/gnu</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/rarlab</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/framework</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Authentication Bypass</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/draytek</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/multiple-devices</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/tomcat</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/multiple-firewalls</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/firefox</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/imagemagick</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/pixel</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/macos</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/struts</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/small-business-rv160-rv260-rv340-and-rv345-series-routers</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/the-record</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/thinkphp</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/tenda</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Remote Support</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/flowiseai</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/active-exploitation</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Ransomware</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/kentico</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Synacor</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CWE-79</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Active exploitation</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Use-After-Free</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Ivanti</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Improper Access Control</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/langflow</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/iOS</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/iPadOS</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/wing-ftp-server</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/broadcom</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/gitlab</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Zimbra</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/CWE-434</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/watchguard</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/gladinet</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/winrar</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/fortra</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios-and-ios-xe</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/sudo</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/sitecore</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/DrayTek</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/http-server</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/fortios-and-fortiproxy</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/adaptive-security-appliance-asa</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/veeam</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/backup-replication</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/Adobe Flash Player</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/netscaler-adc-and-netscaler-gateway</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/minio</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/word</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios-ipados-and-watchos</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/roundcube-webmail</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/gigabyte</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/photo-station</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/ios-and-macos</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/java-runtime-environment-jre</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/network-attached-storage-nas</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/drupal</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/nagios</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/nagios-xi</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/vbulletin</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/application-delivery-controller-adc-gateway-and-sd-wan-wanop-appliance</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/unraid</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/eyesofnetwork</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/accellion</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/fta</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/open-management-infrastructure-omi</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/supply-chain</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/wwbn</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/roxy-wi</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/connectwise</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/screenconnect</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/path-traversal</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/tags/edge</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-34615-adobe-connect</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27303-adobe-connect</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27246-adobe-connect</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27245-adobe-connect</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27243-adobe-connect</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/glassworm-73-openvsx-2026-04-28</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-layerwise-convergence-fingerprints-for-runtime-misbehavior-d-2026-</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-mas-szz-multi-agentic-szz-algorithm-for-vulnerability-induc-2026-0</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-system-aware-contextual-digital-twin-for-ics-anomaly-diagnos-2026-</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-agentvisor-defending-llm-agents-against-prompt-injection-vi-2026-0</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-poster-clawdgo-endogenous-security-awareness-training-for-2026-04-</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-1114-lollms-lollms</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/regulator-fines-fidelity-brokerage-services-1-25m-over-data-breach</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-34989-ci4-cms-erp-ci4ms</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-tracescope-interactive-url-triage-via-decoupled-checklist-a-2026-0</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-automation-exploit-a-multi-agent-llm-framework-for-adaptive-2026-0</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-openclaw-mcp-stdio-server-env-could-load-dangerous-startup-2026-04</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-openclaw-agent-gateway-config-mutations-could-change-protec-2026-0</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-litellm-authenticated-command-execution-via-mcp-stdio-test-2026-04</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/alleged-silk-typhoon-hacker-extradited-to-us</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/agent-threats-field-guide-2026-04-27</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/lyrie-original-shipping-velocity-2026-04-27</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7156-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7155-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7154-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/supreme-court-signals-location-data-searches-should-require-a-warrant</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7152-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7153-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-59557-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-59007-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-58963-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-58951-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-49931-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-49915-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-49380-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-49055-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-48089-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40372-microsoft-asp-net-core</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/alleged-silk-typhoon-hacker-extradited-to-us-for-cyberespionage</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5652-craftycontrol-crafty-controller</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40351-fastgpt-fastgpt</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40575-oauth2-proxy-project-oauth2-proxy</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-44560-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-66956-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-69902-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-70024-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-70041-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25818-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25823-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-29861-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-30625-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31048-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31049-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-68034-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-68001-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-47588-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-32222-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-23781-bmc-control-m-managed-file-transfer</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-70948-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5850-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5851-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5852-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5853-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5854-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5975-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5976-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5977-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5978-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5993-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5994-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5995-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5996-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5997-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6025-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6026-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6027-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6028-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6029-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6112-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6113-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6114-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6115-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6116-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6131-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6132-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6138-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6139-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6140-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6154-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6155-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6156-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-0740-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-3296-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-3535-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-4003-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-69809-p2r3-bareiron</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-69808-p2r3-bareiron</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41176-rclone-rclone</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41179-rclone-rclone</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-67945-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-67944-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-67928-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-67924-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-67910-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-66078-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-66074-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-60062-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-5503-wolfssl-wolfssl</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-42479-ggml-llama-cpp</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2018-25270-thinkphp-thinkphp</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7140-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7139-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-52773-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-52758-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-23993-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33656-espocrm-espocrm</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/lyrie-original-arxiv-cs-cr-2026-04-27</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32298-angeet-es3-kvm-firmware</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-38835-tenda-w30e-firmware</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7138-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7137-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7136-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41462-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40860-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40453-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33454-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-30352-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-64231-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-30269-doorman-doorman</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/pypi-package-with-1-1m-monthly-downloads-hacked-to-push-infostealer</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33453-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31685-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31682-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31669-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31668-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31659-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31657-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31649-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31637-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31636-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31633-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31609-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31608-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31607-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31589-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31536-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31533-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31501-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31478-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-50002-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/italy-extradites-alleged-chinese-state-hacker-to-us</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40911-wwbn-avideo</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33078-roxy-wi-roxy-wi</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41329-openclaw-openclaw</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33076-roxy-wi-roxy-wi</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40884-goshs-goshs</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25660-ericsson-codechecker</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/home-security-giant-adt-data-breach-affects-5-5-million-people</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40342-firebirdsql-firebird</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/one-ransomware-crew-now-drives-half-of-all-cyber-claims-at-bay</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31463-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31448-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31444-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31436-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31414-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31405-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31402-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-23455-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-23450-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-23428-linux-linux-kernel</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-23427-linux-linux-kernel</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-22984-linux-linux-kernel</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33516-neutrinolabs-xrdp</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33689-neutrinolabs-xrdp</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40572-minecanton209-novumos</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40317-minecanton209-novumos</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/medtronic-confirms-breach-after-hackers-claim-9-million-records-theft</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-30836-smallstep-step-ca</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/hackers-impersonate-microsoft-teams-help-desk-to-breach-corporate-networks</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2018-25254-nico-ftp-project-nico-ftp</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7125-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7124-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7123-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-34275-oracle-advanced-inbound-telephony</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7122-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7121-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/energy-and-water-management-firm-itron-hacked</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-22337-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-22336-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41409-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41635-advisory</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/lyrie-original-arxiv-cs-cr-2026-04-27</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-automation-exploit-a-multi-agent-llm-framework-for-adaptive-offensiv</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-behavioral-canaries-auditing-private-retrieved-context-usage-in-rl-f</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-can-soc-operators-explain-their-decisions-while-triaging-alarms-a-re</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-fixv2w-correcting-invalid-cve-cwe-mappings-with-knowledge-graph-embe</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-introducing-the-cyber-physical-data-flow-diagram-to-improve-threat-m</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-privstruct-untangling-data-purpose-compliance-of-privacy-policies-in</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-resource-aware-layered-intrusion-detection-allocation-model</loc><lastmod>2026-04-28T06:11:10.728Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-sovereign-agentic-loops-decoupling-ai-reasoning-from-execution-in-re</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-train-in-vain-functionality-preserving-poisoning-to-prevent-unauthor</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/arxiv-cs-cr-who-audits-the-auditor-tamper-proof-fraud-detection-with-blockchain-</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-42363-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-35051-newforma-project-center</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/lyrie-original-cisa-kev-2026-04-26</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/th-hacker-steals-personal-data-of-350-000-engineers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/kr-data-of-100-000-leaked-from-lee-038-lee-country-golf-club-n-korean-hacking-su</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/american-utility-firm-itron-discloses-breach-of-internal-it-network</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-7037-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/lyrie-original-cisa-kev-2026-04-26</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-4577-php-cgi-windows-character-encoding-rce</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-3400-palo-alto-globalprotect-command-injection</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-1709-connectwise-screenconnect-supply-chain-breach</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-39987-marimo-pre-auth-rce-root-in-one-request</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-7399-samsung-magicinfo-path-traversal-rce</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-23897-jenkins-cli-arbitrary-file-read-args4j-expansion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-4577-php-cgi-rce-windows-best-fit-character-conversion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2023-46604-apache-activemq-openwire-deserialization-rce</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40173-dgraph-dgraph</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-59707-n2ws-n2w</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-59706-n2ws-n2w</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-24467-filigran-openaev</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/lyrie-original-cisa-kev-2026-04-25</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6951-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/adt-confirms-data-breach-after-shinyhunters-leak-threat</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41478-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41428-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41328-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41248-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-7399-samsung-magicinfo-9-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41492-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-34415-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-29635-dlink-dir-823x-firmware</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-57728-simple-help-simplehelp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2024-57726-simple-help-simplehelp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-29649-xiangshan-nemu</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33432-roxy-wi-roxy-wi</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41327-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41276-flowiseai-flowise</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-50229-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/adt-says-customer-data-stolen-in-cyber-intrusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-3300-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-4257-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-39617-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-39619-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-39620-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-39640-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-2942-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-1830-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6911-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-39920-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-34078-flatpak-flatpak</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2006-3601-dnnsoftware-dotnetnuke</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2015-2794-dnnsoftware-dotnetnuke</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/new-pack2theroot-flaw-gives-hackers-root-linux-access</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-33471-nimiq-nimiq-proof-of-stake</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40477-thymeleaf-thymeleaf</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40478-thymeleaf-thymeleaf</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-34279-oracle-enterprise-manager-base-platform</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6919-google-chrome</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6920-google-chrome</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25377-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25413-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25429-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25447-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27044-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27049-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27051-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27071-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27082-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27083-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27084-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-27095-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31920-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32482-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32499-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32502-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32512-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32519-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32520-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32523-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32524-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32525-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32536-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32539-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-32573-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-22484-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-22500-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-22507-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-24378-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-24968-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-24971-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-24989-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-24993-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25029-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25030-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25031-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25032-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25035-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25340-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25345-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25366-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-25371-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-4001-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-4283-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-4585-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6942-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2019-25687-wisdom-pegasus-cms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-22679-weaver-e-cology</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41264-flowiseai-flowise</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41265-flowiseai-flowise</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41268-flowiseai-flowise</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31175-totolink-a3300r-firmware</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2021-4473-topsecgroup-tianxin-internet-behavior-management-system</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41304-wwbn-avideo</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41064-wwbn-avideo</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-62373-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-23751-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-29198-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41228-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41229-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41460-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-41679-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6885-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6886-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-6887-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31177-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31178-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-31181-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-39087-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40470-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40471-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-40472-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-35431-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2026-21515-advisory</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/ocr-announces-settlements-of-four-ransomware-investigations-that-affected-over-4</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-57726-simplehelp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-57728-simplehelp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-7399-magicinfo-9-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-29635-dir-823x</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/south-korea-8217-s-regulator-fines-matchmaking-service-duo-830-000-over-data-bre</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/healthcare-ai-firm-sued-over-alleged-unlawful-disclosures-of-genetic-data</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/trigona-affiliates-deploy-custom-exfiltration-tool-to-streamline-data-theft</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/half-a-million-britons-medical-data-were-offered-for-sale-on-alibaba-in-major-uk</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/ramp-uncovered-anatomy-of-russia-s-ransomware-marketplace</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/mile-bluff-medical-center-says-security-incident-that-involved-data-encryption-d</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-39987-marimo</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/not-for-sale-blueleaks-2-0-hacktivist-decides-not-to-sell-dataset-with-sensitive</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/cve-2025-54236-adobe-commerce</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-33825-defender</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-27351-ng-mf</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-27199-teamcity</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-2749-kentico-xperience</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-32975-kace-systems-management-appliance-sma</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-48700-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20122-catalyst-sd-wan-manger</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20128-catalyst-sd-wan-manager</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20133-catalyst-sd-wan-manager</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-34197-activemq</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-0238-office</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-32201-sharepoint-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-1854-visual-basic-for-applications-vba</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-9715-acrobat</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-21529-exchange-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36424-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-60710-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21643-forticlient-ems</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-34621-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-1340-endpoint-manager-mobile-epmm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/russia-hacked-routers-to-steal-microsoft-office-tokens</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/germany-doxes-8220-unkn-8221-head-of-ru-ransomware-gangs-revil-gandcrab</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-35616-forticlient-ems</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-3502-client</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-5281-dawn</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-3055-netscaler</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-53521-big-ip</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-33634-trivy</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-33017-langflow</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-31277-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-32432-craft-cms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-43510-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-43520-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-54068-livewire</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20131-secure-firewall-management-center-fmc</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-66376-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20963-sharepoint</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-47813-wing-ftp-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-3909-skia</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-3910-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-68613-n8n</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22054-workspace-one-uem</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-26399-web-help-desk</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-1603-endpoint-manager-epm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/project-zero-on-the-effectiveness-of-mutational-grammar-fuzzing</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-7921-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22681-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30952-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41974-ios-and-ipados</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-43000-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21385-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-22719-vmware-aria-operations</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/project-zero-a-deep-dive-into-the-getprocesshandlefromhwnd-api</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-20775-sd-wan</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20127-catalyst-sd-wan-controller-and-manager</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-25108-filezen</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-49113-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-68461-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22175-gitlab</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-22769-recoverpoint-for-virtual-machines-rp4vms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2008-0015-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-7796-zimbra-collaboration-suite</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-7694-threatsonar-anti-ransomware</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-2441-chromium</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-1731-remote-support-rs-and-privileged-remote-access-pra</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/project-zero-bypassing-administrator-protection-by-abusing-ui-access</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-43468-configuration-manager</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-15556-notepad</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-40536-web-help-desk</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20700-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21510-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21513-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21514-office</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21519-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21525-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21533-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-11953-cli</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-24423-smartermail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-19006-freepbx</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-39935-community-and-enterprise-editions</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-40551-web-help-desk</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-64328-freepbx</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/project-zero-breaking-the-sound-barrier-part-ii-exploiting-cve-2024-54529</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-1281-endpoint-manager-mobile-epmm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-24858-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/project-zero-bypassing-windows-administrator-protection</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-14634-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-52691-smartermail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-21509-office</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-23760-smartermail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-24061-inetutils</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-37079-vmware-vcenter-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-31125-vitejs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-34026-concerto</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-54313-eslint-config-prettier</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-68645-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20045-unified-communications-manager</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/project-zero-a-0-click-exploit-chain-for-the-pixel-9-part-1-decoding-dolby</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2026-20805-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-8110-gogs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-0556-office</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-37164-oneview</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-14847-mongodb-and-mongodb-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-52163-ds-2105-pro</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-14733-firebox</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-20393-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-40602-sma1000-appliance</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-59374-live-update</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/project-zero-welcome-to-the-new-project-zero-blog</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/project-zero-thinking-outside-the-box-dusted-off-draft-from-2017</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-59718-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-14611-centrestack-and-triofox</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-43529-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-4063-airlink-aleos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-14174-chromium</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-58360-geoserver</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-6218-winrar</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-62221-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-37055-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-66644-arrayos-ag</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-55182-react-server-components</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26828-scadabr</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-48572-framework</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-48633-framework</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26829-scadabr</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-61757-fusion-middleware</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-13223-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-58034-fortiweb</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-64446-fortiweb</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-12480-triofox</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-62215-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-9242-firebox</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21042-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-11371-centrestack-and-triofox</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-48703-control-web-panel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24893-platform</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-41244-vmware-aria-operations-and-vmware-tools</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-6204-delmia-apriso</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-6205-delmia-apriso</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-54236-commerce-and-magento</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-59287-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-61932-lanscope-endpoint-manager</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-48503-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-2746-xperience-cms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-2747-xperience-cms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-33073-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-61884-e-business-suite</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-54253-experience-manager-aem-forms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7836-client-view</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24990-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-47827-igel-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-59230-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-43798-grafana</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-27915-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-3765-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-3962-internet-explorer</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-3402-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3918-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22555-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-43226-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-61882-e-business-suite</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-6278-gnu-bash</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-7755-screenos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-1000353-jenkins</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21043-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-4008-meteobridge</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21311-adminer</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-10035-goanywhere-mft</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-20352-ios-and-ios-xe</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-32463-sudo</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-59689-email-security-gateway</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-20333-secure-firewall-adaptive-security-appliance-and-se</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-20362-secure-firewall-adaptive-security-appliance-and-se</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-10585-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-5086-delmia-apriso</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-38352-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-48543-runtime</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-53690-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-50224-tl-wr841n</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-9377-multiple-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-24363-tl-wa855re</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-55177-whatsapp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-57819-freepbx</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-7775-netscaler</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-8068-session-recording</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-8069-session-recording</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-48384-git</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-43300-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-54948-apex-one</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-8875-n-central</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-8876-n-central</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2007-0671-office</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3893-internet-explorer</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-8088-winrar</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-25078-dcs-2530l-and-dcs-2670l-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-25079-dcs-2530l-and-dcs-2670l-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-40799-dnr-322l</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-2533-ng-mf</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-20281-identity-services-engine</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-20337-identity-services-engine</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-2775-sysaid-on-prem</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-2776-sysaid-on-prem</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-49704-sharepoint</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-49706-sharepoint</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-54309-crushftp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-6558-chromium</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-53770-sharepoint</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-25257-fortiweb</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-47812-wing-ftp-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-5777-netscaler-adc-and-gateway</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-3931-multi-router-looking-glass-mrlg</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-10033-phpmailer</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-5418-ruby-on-rails</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-9621-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-6554-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-48927-tm-sgnl</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-48928-tm-sgnl</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-6543-netscaler-adc-and-gateway</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-6693-fortios</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-0769-dir-859-router</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-54085-megarac-spx</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-0386-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-33538-multiple-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-43200-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24016-wazuh-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-33053-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-42009-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-32433-erlang-otp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-5419-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21479-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21480-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-27038-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-32030-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-39780-rt-ax55-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-56145-craft-cms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-35939-craft-cms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-3935-screenconnect</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-4632-magicinfo-9-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-38950-biotime</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-11182-email-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-27443-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-27920-output-messenger</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-4427-endpoint-manager-mobile-epmm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-4428-endpoint-manager-mobile-epmm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-12987-vigor-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-42999-netweaver</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-32756-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-30397-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-30400-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-32701-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-32706-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-32709-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-47729-tm-sgnl</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-11120-multiple-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-6047-multiple-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-27363-freetype</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-3248-langflow</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-58136-yii</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-34028-command-center</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-44221-sma100-appliances</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38475-http-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-31324-netweaver</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-1976-brocade-fabric-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-3928-web-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-42599-active-mail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24054-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-31200-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-31201-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20035-sma100-appliances</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-53150-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-53197-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-29824-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-30406-centrestack</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-31161-crushftp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-22457-connect-secure-policy-secure-and-zta-gateways</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24813-tomcat</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-20439-smart-licensing-utility</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-2783-chromium-mojo</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-9874-cms-and-experience-platform-xp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-9875-cms-and-experience-platform-xp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-30154-action-setup-github-action</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12637-netweaver</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-48248-backup-and-replication</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-1316-ic-7100-ip-camera</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24472-fortios-and-fortiproxy</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-30066-changed-files-github-action</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21590-junos-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24201-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24983-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24984-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24985-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24991-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24993-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-26633-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-13159-endpoint-manager-epm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-13160-endpoint-manager-epm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-13161-endpoint-manager-epm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-57968-veracore</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-25181-veracore</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-50302-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-22224-esxi-and-workstation</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-22225-esxi</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-22226-esxi-workstation-and-fusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8639-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-43769-pentaho-business-analytics-ba-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-43939-pentaho-business-analytics-ba-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-20118-small-business-rv-series-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4885-whatsup-gold</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-34192-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-49035-partner-center</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-3066-coldfusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-20953-agile-product-lifecycle-management-plm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24989-power-pages</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-0111-pan-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-23209-craft-cms</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-53704-sonicos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-0108-pan-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-57727-simplehelp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-41710-sip-phones</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24200-ios-and-ipados</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-40890-dsl-cpe-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-40891-dsl-cpe-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21391-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21418-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-0994-cityworks</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-15069-xg-firewall</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-29574-cyberoamos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-23748-dante-discovery</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21413-office-outlook</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-0411-7-zip</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-53104-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-19410-prtg-network-monitor</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-9276-prtg-network-monitor</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-29059-net-framework</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-45195-ofbiz</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-24085-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-23006-sma1000-appliances</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-11023-jquery</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-50603-controllers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-55591-fortios-and-fortiproxy</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21333-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21334-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-21335-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-48365-sense</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-12686-privileged-remote-access-pra-and-remote-support-rs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2025-0282-connect-secure-policy-secure-and-zta-gateways</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-2883-weblogic-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-41713-micollab</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-55550-micollab</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-3393-pan-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-44207-usaherds</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-12356-privileged-remote-access-pra-and-remote-support-rs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-14933-nvrmini-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11001-multiple-ip-cameras</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-40407-rlc-410w-ip-camera</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-23227-nvrmini2-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-55956-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-20767-coldfusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-35250-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-50623-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-49138-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-51378-cyberpanel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-45727-proself</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-11667-multiple-firewalls</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-11680-projectsend</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28461-ag-vxag-arrayos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21287-agile-product-lifecycle-management-plm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-44308-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-44309-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38812-vcenter-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38813-vcenter-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-0012-pan-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-1212-kemp-loadmaster</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-9474-pan-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-9463-expedition</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-9465-expedition</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-2120-adaptive-security-appliance-asa</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26086-jira-server-and-data-center</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-41277-metabase</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-43451-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-49039-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-16278-nhttpd</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-43093-framework</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-51567-cyberpanel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-5910-expedition</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-8956-pt30x-sdi-ndi-cameras</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-8957-pt30x-sdi-ndi-cameras</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-20481-adaptive-security-appliance-asa-and-firepower-thre</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-37383-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-47575-fortimanager</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38094-sharepoint</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-9537-sl1</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-40711-backup-replication</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-28987-web-help-desk</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-30088-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-9680-firefox</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-23113-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-9379-cloud-services-appliance-csa</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-9380-cloud-services-appliance-csa</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-43047-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-43572-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-43573-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-45519-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-29824-endpoint-manager-epm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0344-commerce-cloud</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-15415-multiple-vigor-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-25280-dir-820-router</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-7593-virtual-traffic-manager</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-8963-cloud-services-appliance-csa</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0618-sql-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-14644-weblogic-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-21445-adf-faces</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-27348-hugegraph-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0643-flash-player</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0648-flash-player</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0497-flash-player</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0502-flash-player</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-43461-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-6670-whatsup-gold</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-8190-cloud-services-appliance</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38014-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38217-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38226-publisher</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3714-imagemagick</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-1000253-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-40766-sonicos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20123-vigorconnect</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20124-vigorconnect</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-7262-wps-office</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-7965-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38856-ofbiz</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-7971-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-39717-director</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31196-exchange-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-33044-ip-camera-firmware</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-33045-ip-camera-firmware</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-0185-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-23897-jenkins-command-line-interface-cli</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-28986-web-help-desk</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38106-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38107-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38178-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38189-project</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38193-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38213-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-32113-ofbiz</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-36971-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0824-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-37085-esxi</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-45249-cyber-infrastructure-aci</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4879-utah-vancouver-and-washington-dc-now-platform</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-5217-utah-vancouver-and-washington-dc-now-platform</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-4792-internet-explorer</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-39891-authy</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22948-vcenter-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-28995-serv-u</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-34102-commerce-and-magento-open-source</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-36401-geoserver</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-23692-http-file-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38080-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-38112-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-20399-nx-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-13965-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-24816-jai-ext</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-2586-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-26169-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-32896-pixel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4358-telerik-report-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4577-php</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4610-mali-gpu-kernel-driver</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-3506-weblogic-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-1086-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-24919-quantum-security-gateways</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4978-viewer</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-5274-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-17519-flink</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-43208-mirth-connect</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4947-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-100005-dir-600-router</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-40655-dir-605-router</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4761-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-30040-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-30051-dwm-core-library</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4671-chromium</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-7028-gitlab-ce-ee</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-29988-smartscreen-prompt</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-20353-adaptive-security-appliance-asa-and-firepower-thre</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-20359-adaptive-security-appliance-asa-and-firepower-thre</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-4040-crushftp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-38028-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-3400-pan-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-3272-multiple-nas-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-3273-multiple-nas-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-29745-pixel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-29748-pixel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-24955-sharepoint-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7256-linear-emerge-e3-series</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-44529-endpoint-manager-cloud-service-appliance-epm-csa</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-48788-forticlient-ems</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-27198-teamcity</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-23225-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-23296-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-36380-sureline</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-21237-pixel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21338-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-29360-streaming-service</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-1709-screenconnect</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3259-adaptive-security-appliance-asa-and-firepower-threa</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21410-exchange-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21351-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21412-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-43770-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21762-fortios</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-4762-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-48618-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21893-connect-secure-policy-secure-and-neurons</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-22527-confluence-data-center-and-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-23222-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-34048-vcenter-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-35082-endpoint-manager-mobile-epmm-and-mobileiron-core</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-6548-netscaler-adc-and-netscaler-gateway</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-6549-netscaler-adc-and-netscaler-gateway</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-0519-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-15133-laravel-framework</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-29357-sharepoint-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-46805-connect-secure-and-policy-secure</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2024-21887-connect-secure-and-policy-secure</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-20017-dsl-2750b-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-23752-joomla</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-27524-superset</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-29300-coldfusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-38203-coldfusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41990-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-7024-chromium-webrtc</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-7101-spreadsheet-parseexcel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-47565-viostor-nvr</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-49897-ae1021-ae1021pe</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-6448-vision-plc-and-hmi</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41265-sense</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41266-sense</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22071-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-33063-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-33106-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-33107-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-42916-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-42917-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-49103-owncloud-graphapi</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-6345-chromium-skia</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-4911-gnu-c-library</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-2551-fusion-middleware</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-1671-web-appliance</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36584-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36025-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36033-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36036-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36844-junos-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36845-junos-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36846-junos-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36847-junos-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36851-junos-os</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-47246-sysaid-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-29552-service-location-protocol-slp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-22518-confluence-data-center-and-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-46604-activemq</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-46747-big-ip-configuration-utility</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-46748-big-ip-configuration-utility</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-5631-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-20273-cisco-ios-xe-web-ui</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-4966-netscaler-adc-and-netscaler-gateway</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-20198-ios-xe-web-ui</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-20109-ios-and-ios-xe</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-21608-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36563-wordpad</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41763-skype-for-business</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-44487-http-2</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-22515-confluence-data-center-and-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-40044-ws-ftp-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-42824-ios-and-ipados</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28229-windows-cng-key-isolation-service</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-42793-teamcity</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-4211-mali-gpu-kernel-driver</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-5217-chromium-libvpx</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-14667-jboss-richfaces-framework</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41991-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41992-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41993-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41179-apex-one-and-worry-free-business-security</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28434-minio</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-8361-sdk</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6884-emg2926-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-3129-ignition</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22265-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-26369-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-20269-adaptive-security-appliance-and-firepower-threat-d</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-35674-framework</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-4863-chromium-webp</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36761-word</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36802-streaming-service-proxy</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41061-ios-ipados-and-watchos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-41064-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-33246-rocketmq</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-32315-openfire</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-38831-winrar</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-27532-backup-replication</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-38035-sentry</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-26359-coldfusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-24489-content-collaboration</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-38180-net-core-and-visual-studio</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-18368-p660hn-t1a-routers</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-35081-endpoint-manager-mobile-epmm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-37580-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-38606-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-35078-endpoint-manager-mobile-epmm</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-29298-coldfusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-38205-coldfusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-3519-netscaler-adc-and-netscaler-gateway</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36884-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-29303-compact</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-37450-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-31199-auditor</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-32046-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-32049-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-35311-outlook</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-36874-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-29256-mali-graphics-processing-unit-gpu</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-17621-dir-859-router</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-20500-dwl-2600ap-access-point</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25371-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25372-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25394-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25395-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25487-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25489-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-20867-tools</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-27992-multiple-network-attached-storage-nas-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-32434-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-32435-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-32439-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0165-win32k</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-9079-firefox-firefox-esr-and-thunderbird</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-12641-roundcube-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-35730-roundcube-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-44026-roundcube-webmail</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-20887-aria-operations-for-networks</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-27997-fortios-and-fortiproxy-ssl-vpn</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-3079-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-33009-multiple-firewalls</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-33010-multiple-firewalls</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-34362-moveit-transfer</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28771-multiple-firewalls</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-2868-email-security-gateway-esg-appliance</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28204-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-32373-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-32409-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2004-1464-ios</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-6415-ios-ios-xr-and-ios-xe</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-21492-mobile-devices</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-3904-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0196-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-5317-jenkins-user-interface-ui</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3427-java-se-and-jrockit</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-8735-tomcat</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-3560-polkit</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-25717-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-29336-win32k</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-45046-log4j2</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-1389-archer-ax21</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-21839-weblogic-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-2136-chromium-skia</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-27350-mf-ng</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28432-minio</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6742-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-8526-macos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-2033-chromium-v8</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-20963-framework</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-29492-novi-survey</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28252-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28205-multiple-products</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-28206-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1388-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27876-backup-exec-agent</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27877-backup-exec-agent</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27878-backup-exec-agent</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-26083-mali-graphics-processing-unit-gpu</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-27926-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3163-internet-explorer</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-7494-samba</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30900-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22706-mali-graphics-processing-unit-gpu</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-3038-chromium-network-service</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-38181-mali-graphics-processing-unit-gpu</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-39197-cobalt-strike</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-42948-cobalt-strike</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-0266-kernel</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-26360-coldfusion</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41328-fortios</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-23397-office</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-24880-windows</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-5741-media-server</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-39144-xstream</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-28810-manageengine</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-33891-spark</loc><lastmod>2026-04-28T06:11:10.729Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-35914-glpi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-36537-auuploader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-40765-mivoice-connect</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41223-mivoice-connect</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-47986-aspera-faspex</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-46169-cacti</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-21715-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-21823-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-23376-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-23529-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2291-ethernet-diagnostics-driver-for-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-24990-terramaster-os</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-0669-goanywhere-mft</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-21587-e-business-suite</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-22952-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-11357-user-interface-ui-for-asp-net-ajax</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-47966-manageengine</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-44877-control-web-panel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41080-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2023-21674-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-18809-jasperreports</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-5430-jasperreports</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-42856-ios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26500-backup-replication</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26501-backup-replication</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-27518-application-delivery-controller-adc-and-gateway</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-42475-fortios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-44698-defender</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-4262-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-35587-fusion-middleware</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-4135-chromium-gpu</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41049-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25337-mobile-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25369-mobile-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25370-mobile-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41073-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41091-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41125-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41128-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-3723-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-42827-ios-and-ipados</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-19320-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-19321-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-19322-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-19323-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3153-anyconnect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3433-anyconnect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-3493-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41352-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-40684-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41033-windows-com-event-system-service</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-36804-bitbucket-server-and-data-center</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41040-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-41082-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-3236-firewall</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-35405-manageengine</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-2568-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-2094-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-2596-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-2597-acdb-audio-driver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-6282-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-40139-apex-one-and-apex-one-as-a-service</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-32917-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-37969-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-1823-android-os</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-4723-dir-300-router</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-5521-multiple-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-13374-fortios-and-fortiadc</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-2628-weblogic-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-6530-multiple-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-7445-routeros</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-9934-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26258-dir-820l</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-27593-photo-station</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-3075-chromium-mojo</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-28949-archive-tar</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-36193-archive-tar</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31010-ios-macos-watchos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38406-dopsoft-2</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-39226-grafana</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-2294-webrtc</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22963-spring-cloud</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-24112-apisix</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-24706-couchdb</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26352-dotcms</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-0028-pan-os</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-15944-pan-os</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-21971-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22536-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26923-active-directory</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-2856-chromium-intents</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-32893-ios-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-32894-ios-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-27925-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-37042-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-30333-unrar</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-34713-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-27924-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26138-confluence</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22047-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26925-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-4344-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-8605-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3837-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-9907-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30533-chromium-popupblocker</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30983-ios-and-ipados</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-4034-polkit</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-29499-mivoice-connect</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-30190-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-2386-netweaver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-2388-netweaver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38163-netweaver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2006-2492-word</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2007-5659-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2008-0655-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-0557-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-0563-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-1862-acrobat-and-reader-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-3953-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-4324-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-1297-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-2572-powerpoint</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-2883-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-0609-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-2462-reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-0151-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-0754-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-0767-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-1889-xml-core-services</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-4969-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-5054-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-1331-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-1646-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-5198-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-5030-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-5070-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6862-multiple-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-17463-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-17480-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-4990-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-6065-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-15271-rv-series-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-5825-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7192-photo-station</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7193-qts</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7194-photo-station</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7195-photo-station</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26134-confluence-server-data-center</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-0738-jboss</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-0840-java-runtime-environment-jre</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-1428-jboss</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-1710-fusion-middleware</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0074-silverlight</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0422-java-runtime-environment-jre</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0431-java-runtime-environment-jre</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-2423-java-runtime-environment-jre</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3896-silverlight</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3993-infosphere-biginsights</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-7331-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0546-reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-2817-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-3153-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-4077-input-method-editor-ime-japanese</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-4123-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-4148-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-8439-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-0016-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-0071-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-0310-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1671-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1769-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2360-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2425-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-4495-firefox</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-6175-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-8651-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0034-silverlight</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0984-flash-player-and-air</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-1010-flash-player-and-air</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3393-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7256-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-3010-solaris</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0162-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3298-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3351-internet-explorer-and-edge</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-4655-ios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-4656-ios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-4657-ios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-6366-adaptive-security-appliance-asa</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-6367-adaptive-security-appliance-asa</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0005-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0022-xml-core-services</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0147-smbv1-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0149-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0210-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-18362-virtual-system-server-administrator-vsa</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-8291-ghostscript</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-8543-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-19943-network-attached-storage-nas</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-19949-network-attached-storage-nas</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-19953-network-attached-storage-nas</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8611-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-5002-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8589-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0676-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0703-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0880-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1130-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11707-firefox-and-thunderbird</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11708-firefox-and-thunderbird</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-13720-chrome-webaudio</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1385-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-18426-whatsapp</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-5786-chrome-blink</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7286-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7287-ios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-8720-webkitgtk</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0638-update-notification-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1027-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-0920-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1048-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30883-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-20821-ios-xr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22947-spring-cloud-gateway</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-30525-multiple-firewalls</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-1388-big-ip</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0160-openssl</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0322-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-4113-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-8506-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1789-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1003029-script-security-plugin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-40450-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-41357-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-0847-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-21919-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26904-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-29464-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-6882-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-3568-whatsapp</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22718-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2007-3010-omnipcx-enterprise</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-5330-airos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0780-web-studio</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-4523-vtscada-formerly-vts</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-7841-u-motion-builder</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-16057-dns-320-storage-device</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-3929-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-1364-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22960-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22954-workspace-one-access-and-identity-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-9163-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-0311-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-0313-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2502-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-3113-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-5122-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-5123-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-20753-virtual-system-server-administrator-vsa</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-7602-core</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-24521-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-11317-user-interface-ui-for-asp-net-ajax</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-2509-qnap-network-attached-storage-nas</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22600-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27852-checkbox-survey</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-39793-pixel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-42278-active-directory</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-42287-active-directory</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-23176-firebox-and-xtm</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0148-smbv1-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31166-http-protocol-stack</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-3156-sudo</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-45382-multiple-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22674-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22675-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22965-spring-framework</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-10561-gigabit-passive-optical-network-gpon-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-10562-gigabit-passive-optical-network-gpon-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21551-dbutil-driver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-28799-network-attached-storage-nas</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-34484-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-1040-firewall</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26871-apex-central</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-4398-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-2005-ancillary-function-driver-afd-sys</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-0518-fusion-middleware</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-2034-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-2539-word</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-5076-java-se</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-1690-firefox-and-thunderbird</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-2465-java-se</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-2551-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-2729-reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3660-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1770-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2419-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2426-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0040-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0151-client-server-run-time-subsystem-csrss</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0189-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7200-edge</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7201-edge</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0037-edge-and-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0059-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0213-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8405-directx-graphics-kernel-dxgkrnl</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8406-directx-graphics-kernel-dxgkrnl</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8440-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7483-sma100</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20028-secure-remote-access-sra</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26085-confluence-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-34486-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38646-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-0543-debian-specific-redis-servers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-1096-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2005-2773-openview-network-node-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-0927-reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-1151-phpmyadmin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-2055-ios-xr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-2861-coldfusion</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-3035-ios-xr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-4344-exim</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-4345-exim</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-1823-php</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-2251-struts</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-4810-procurve-manager-pcm-pcm-identity-driven-manager-id</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-5223-dsl-2760u</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0130-ruby-on-rails</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-3120-elasticsearch</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-6287-http-file-server-hfs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-6324-kerberos-key-distribution-center-kdc</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-6332-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-0666-prime-data-center-network-manager-dcnm</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1187-multiple-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1427-elasticsearch</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-3035-multiple-archer-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-4068-unified-data-protection-udp</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0752-ruby-on-rails</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-10174-wnr2000v5-router</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-11021-dcs-930l-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-1555-wireless-access-point-wap-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-4171-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7892-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0146-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12615-tomcat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12617-tomcat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-3881-ios-and-ios-xe</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6316-netscaler-sd-wan-enterprise-cloudbridge-virtual-wan</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6334-dgn2200-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0125-vpn-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0147-secure-access-control-system-acs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-11138-kace-system-management-appliance</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-1273-spring-data-commons</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-14839-n1a1-nas</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-6961-sd-wan-edge</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8373-internet-explorer-scripting-engine</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8414-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0903-graphics-device-interface-gdi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1003030-matrix-project-plugin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-10068-xperience</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11043-fastcgi-process-manager-fpm</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-12989-sd-wan-and-netscaler</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-12991-sd-wan-and-netscaler</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-15107-webmin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-16920-multiple-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-2616-bi-publisher-formerly-xml-publisher</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-6340-core</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1631-junos-os</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1956-kylin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-2021-pan-os</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-2506-helpdesk</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-25223-sg-utm</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-5410-spring-cloud-configuration-config-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-7247-opensmtpd</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-9054-multiple-network-attached-storage-nas-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-9377-dir-610-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22941-sharefile</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-42237-xp</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-21999-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26143-micollab-mivoice-business-express</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26318-firebox-and-xtm-appliances</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2546-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3309-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0101-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8120-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0543-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0841-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1064-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1069-task-scheduler</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1129-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1132-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1253-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1315-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1322-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1405-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-5135-sonicos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-3960-blazeds</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0625-coldfusion</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0629-coldfusion</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0631-coldfusion</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-6277-multiple-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6077-wireless-router-dgn2200</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11581-jira-server-and-data-center</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8218-pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21973-vcenter-server-and-cloud-foundation</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26485-firefox</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-26486-firefox</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2002-0367-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2004-0210-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2008-2992-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2008-3431-virtualbox</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-1123-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2009-3129-excel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-0188-reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-0232-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-3333-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-0611-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-1889-forefront-threat-management-gateway-tmg</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2011-3544-java-se-jdk-and-jre</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-0507-java-se</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-1535-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-1723-java-se</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-1856-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-4681-java-se</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0632-coldfusion</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0640-reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-0641-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-1347-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-1675-firefox</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3346-reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3897-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-5065-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-0496-reader-and-acrobat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-4114-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1642-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1701-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2387-atm-font-driver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2424-powerpoint</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2545-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2590-java-se</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-3043-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-4902-java-se</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-5119-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-7645-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0099-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-1019-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-4117-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-5195-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7193-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7262-excel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7855-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-8562-simatic-cp</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0001-graphics-device-interface-gdi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0261-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-11292-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-11826-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12231-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12232-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12233-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12234-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12235-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12237-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12238-catalyst-6800-series-switches</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12240-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12319-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6627-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6663-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6736-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6737-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6738-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6739-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6740-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6743-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6744-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-8540-malware-protection-engine</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0151-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0154-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0155-catalyst-4500-series-switches-and-cisco-catalyst-45</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0156-ios-software-and-cisco-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0158-ios-software-and-cisco-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0159-ios-software-and-cisco-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0161-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0167-ios-xr-and-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0172-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0173-ios-and-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0174-ios-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0175-ios-xr-and-xe-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0179-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0180-ios-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8298-chakracore-scripting-engine</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8581-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1297-excel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1652-small-business-rv320-and-rv325-dual-gigabit-wan-vpn</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-16928-exim-internet-mailer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-11899-ipv6</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1938-tomcat</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-41379-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-20699-small-business-rv160-rv260-rv340-and-rv345-series-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-20700-small-business-rv160-rv260-rv340-and-rv345-series-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-20701-small-business-rv160-rv260-rv340-and-rv345-series-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-20703-small-business-rv160-rv260-rv340-and-rv345-series-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-20708-small-business-rv160-rv260-rv340-and-rv345-series-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-6352-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0222-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-8570-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-24682-zimbra-collaborate-suite-zcs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-23131-frontend</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-23134-frontend</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3906-graphics-component</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-1761-word</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-9841-phpunit</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-15982-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-20250-winrar</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8174-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0752-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-0609-chromium-animation</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-24086-commerce-and-magento-open-source</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22620-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-4404-os-x</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1130-os-x</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1635-http-sys</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-2051-dir-645-router</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3088-activemq</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0144-smbv1</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0145-smbv1</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0262-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0263-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-10271-weblogic-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-8464-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-9791-struts-1</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-1000861-jenkins-stapler-web-framework</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0796-smbv3</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-36934-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-21882-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-1776-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-6271-bourne-again-shell-bash</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-7169-bourne-again-shell-bash</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-5689-active-management-technology-amt-small-business-tec</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0787-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-5722-ucm6200</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20038-sma-100-appliances</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2022-22587-ios-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2006-1547-struts-1</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-0391-struts-2</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8453-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-35247-serv-u</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-11978-airflow</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-13671-drupal-core</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-13927-airflow-s-experimental-api</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-14864-intelligence-enterprise-edition</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21315-system-information-library-for-node-js</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21975-vrealize-operations-manager-api</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22991-big-ip-traffic-management-microkernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25296-nagios-xi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25297-nagios-xi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-25298-nagios-xi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-32648-october-cms</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-33766-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-40870-aviatrix-controller</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2013-3900-winverifytrust-function</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-7450-websphere-application-server-and-server-hypervisor-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-1000486-primefaces-application</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-13382-fortios-and-fortiproxy</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-13383-fortios-and-fortiproxy</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-10149-mail-transfer-agent-mta</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1458-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1579-pan-os</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-2725-weblogic-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7609-kibana</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-9670-zimbra-collaboration-suite-zcs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-6572-chrome-media</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22017-vcenter-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27860-warp-ipvpn-and-mpvpn-software</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-36260-security-cameras-web-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-4102-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-43890-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-1871-jboss-seam-2</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-12149-jboss-application-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-17562-goahead</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0193-solr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-10758-mongo-express</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-13272-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7238-nexus-repository-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-17463-fuel-cms</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8816-adminlte</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-35394-jungle-software-development-kit-sdk</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-44168-fortios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-44228-log4j2</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-44515-desktop-central</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-14847-routeros</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-11261-snapdragon-auto-snapdragon-compute-snapdragon-conn</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-37415-manageengine-servicedesk-plus-sdp</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-40438-apache</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-44077-manageengine-servicedesk-plus-sdp-supportcenter-pl</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22204-exiftool</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-40449-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-42292-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-42321-exchange</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2010-5326-netweaver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-0158-mscomctl-ocx</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2012-3152-fusion-middleware</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2014-1812-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-1641-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2015-4852-weblogic-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0167-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-0185-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3235-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3643-virtualization-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3715-imagemagick</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3718-imagemagick</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-3976-netweaver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-4437-shiro</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-7255-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2016-9563-netweaver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0143-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-0199-office-and-wordpad</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-11774-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-11882-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-16651-roundcube-webmail</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-5638-struts</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-6327-symantec-messaging-gateway</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-7269-internet-information-services-iis</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-8759-net-framework</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-9248-asp-net-ajax-and-sitefinity</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-9805-struts</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2017-9822-dotnetnuke-dnn</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0171-ios-and-ios-xe</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0296-adaptive-security-appliance-asa</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0798-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-0802-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-11776-struts</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-13379-fortios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-14558-ac7-ac9-and-ac10-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-15811-dotnetnuke-dnn</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-15961-coldfusion</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-18325-dotnetnuke-dnn</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-20062-nonecms</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-2380-customer-relationship-management-crm</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-4878-flash-player</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-4939-coldfusion</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-6789-exim</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-7600-drupal-core</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2018-8653-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0211-http-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0541-mshtml</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0604-sharepoint</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0708-remote-desktop-services</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0797-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0803-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0808-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0859-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-0863-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11510-pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11539-pulse-connect-secure-and-pulse-policy-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11580-crowd-and-crowd-data-center</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-11634-workspace-application-and-receiver-for-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1214-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1215-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-13608-storefront-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1367-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1429-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-15752-desktop-community-edition</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-15949-nagios-xi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-16256-toolbox-browser</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-1653-small-business-rv320-and-rv325-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-16759-vbulletin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-17026-firefox-and-thunderbird</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-17558-solr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-18187-officescan</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-18935-telerik-ui-for-asp-net-ajax</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-18988-desktop</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-19356-wf2419-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-19781-application-delivery-controller-adc-gateway-and-sd</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-20085-nvms-1000</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-2215-android-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-3396-confluence-server-and-data-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-3398-confluence-server-and-data-center</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-4716-planning-analytics</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-5544-vmware-esxi-and-horizon-daas</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-5591-fortios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-6223-ios-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-7481-sma100</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-8394-manageengine</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-9082-thinkphp</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2019-9978-social-warfare-plugin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0041-android-kernel</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0069-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0601-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0646-net-framework</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0674-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0683-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0688-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0878-edge-and-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0938-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0968-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-0986-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-10148-orion</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-10181-enhanced-multimedia-router-emr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-10189-manageengine</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-10199-nexus-repository</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1020-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-10221-rconfig</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1040-hyper-v-remotefx</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1054-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-10987-ac1900-router-ac15-model</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1147-net-framework-sharepoint-visual-studio</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-11651-salt</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-11652-salt</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-11738-snap-creek-duplicator-plugin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-12271-sfos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-12812-fortios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1350-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1380-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1464-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-1472-netlogon</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-14750-weblogic-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-14871-solaris-and-zettabyte-file-system-zfs</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-14882-weblogic-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-14883-weblogic-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-15505-mobileiron-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-15999-chrome-freetype</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-16009-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-16010-chrome-for-android-ui</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-16013-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-16017-chrome</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-16846-salt</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-17087-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-17144-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-17496-vbulletin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-17530-struts</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-24557-apex-one-officescan-and-worry-free-business-securi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-25213-file-manager-plugin</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-25506-dns-320-device</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-2555-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-26919-jgs516pe-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-27930-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-27932-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-27950-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-29557-dir-825-r1-devices</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-29583-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3118-ios-xr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3161-cisco-ip-phones</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3452-adaptive-security-appliance-asa-and-firepower-threa</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3566-ios-xr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3569-ios-xr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3580-adaptive-security-appliance-asa-and-firepower-threa</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3950-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3952-vcenter-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-3992-esxi</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-4006-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-4427-data-risk-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-4428-data-risk-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-4430-data-risk-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-5735-cameras-and-network-video-recorder-nvr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-5847-unraid</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-5849-unraid</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-5902-big-ip</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-6207-solution-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-6287-netweaver</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-6418-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-6819-firefox-and-thunderbird</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-6820-firefox-and-thunderbird</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-7961-liferay-portal</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8193-application-delivery-controller-adc-gateway-and-sd-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8195-application-delivery-controller-adc-gateway-and-sd-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8196-application-delivery-controller-adc-gateway-and-sd-</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8243-pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8260-pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8467-apex-one-and-officescan</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8468-apex-one-officescan-and-worry-free-business-securit</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8515-multiple-vigor-routers</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8599-apex-one-and-officescan</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8644-playsms</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8655-eyesofnetwork</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-8657-eyesofnetwork</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-9818-ios-ipados-and-watchos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-9819-ios-ipados-and-watchos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2020-9859-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1497-hyperflex-hx</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1498-hyperflex-hx</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1647-defender</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1675-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1732-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1782-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1870-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1871-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1879-ios-ipados-and-watchos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1905-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-1906-multiple-chipsets</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20016-sslvpn-sma100</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20021-sonicwall-email-security</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20022-sonicwall-email-security</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20023-sonicwall-email-security</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-20090-buffalo-firmware</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21017-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21148-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21166-chromium</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21193-chromium-blink</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21206-chromium-blink</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21220-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21224-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21972-vcenter-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-21985-vcenter-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22005-vcenter-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22205-community-and-enterprise-editions</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22502-operation-bridge-reporter-obr</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22506-micro-focus-access-manager</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22893-pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22894-pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22899-pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22900-pulse-connect-secure</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-22986-big-ip-and-big-iq-centralized-management</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-23874-mcafee-total-protection-mtp</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26084-confluence-server-and-data-center</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26411-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26855-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26857-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-26858-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27059-office</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27065-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27085-internet-explorer</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27101-fta</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27102-fta</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27103-fta</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27104-fta</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27561-device-management</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-27562-trusted-firmware</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-28310-win32k</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-28550-acrobat-and-reader</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-28663-mali-graphics-processing-unit-gpu</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-28664-mali-graphics-processing-unit-gpu</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30116-virtual-system-server-administrator-vsa</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30551-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30554-chromium-webgl</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30563-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30632-chromium-v8</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30633-chromium-indexed-db-api</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30657-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30661-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30663-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30665-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30666-ios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30713-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30761-ios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30762-ios</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30807-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30858-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30860-multiple-products</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-30869-ios-ipados-and-macos</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31199-enhanced-cryptographic-provider</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31201-enhanced-cryptographic-provider</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31207-exchange-server</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31755-ac11-router</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31955-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31956-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-31979-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-33739-windows</loc><lastmod>2026-04-28T06:11:10.730Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-33742-windows</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-33771-windows</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-34448-windows</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-34473-exchange-server</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-34523-exchange-server</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-34527-windows</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-35211-serv-u</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-35395-ap-router-sdk</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-35464-access-management-am</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-36741-apex-one-apex-one-as-a-service-and-worry-free-busi</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-36742-apex-one-apex-one-as-a-service-and-worry-free-busi</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-36942-windows</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-36948-windows</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-36955-windows</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-37973-chromium-portals</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-37975-chromium-v8</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-37976-chromium</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38000-chromium-intents</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38003-chromium-v8</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38645-open-management-infrastructure-omi</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38647-open-management-infrastructure-omi</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38648-open-management-infrastructure-omi</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-38649-open-management-infrastructure-omi</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-40444-mshtml</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-40539-manageengine</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-41773-http-server</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-42013-http-server</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
<url><loc>https://research.lyrie.ai/research/active-exploit-cve-2021-42258-billquick-web-suite</loc><lastmod>2026-04-28T06:11:10.731Z</lastmod></url>
</urlset>