<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://orbisappsec.com</loc>
<lastmod>2026-05-13T23:37:16.960Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog</loc>
<lastmod>2026-05-13T23:37:16.960Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/command-injection-in-firejails-netfilterc-how-environment-variables-can-lead-to-root-compromise-20260513</loc>
<lastmod>2026-05-13T23:25:24.806Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/stack-buffer-overflow-in-mapscale-how-five-unsafe-sprintf-calls-created-a-critical-vulnerability-20260513</loc>
<lastmod>2026-05-13T23:22:04.656Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/integer-overflow-to-heap-corruption-fixing-a-critical-q3asm-vulnerability-20260513</loc>
<lastmod>2026-05-13T23:00:37.405Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/heap-buffer-overflows-in-yaml-parser-how-unchecked-memcpy-calls-create-critical-attack-vectors-20260513</loc>
<lastmod>2026-05-13T23:00:29.323Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-fixed-when-safe-functions-arent-safe-20260513</loc>
<lastmod>2026-05-13T22:57:32.629Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/heap-buffer-overflow-in-lexer-how-a-missing-bounds-check-becomes-critical-20260513</loc>
<lastmod>2026-05-13T22:54:27.662Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/path-traversal-vulnerability-fixed-in-hatch-pet-scripts-a-deep-dive-20260513</loc>
<lastmod>2026-05-13T22:53:59.220Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/stack-buffer-overflow-via-unbounded-sprintf-in-hardinfo2-cpu-utility-20260513</loc>
<lastmod>2026-05-13T10:53:16.636Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-pluginc-how-unsafe-sprintf-calls-enable-code-execution-20260513</loc>
<lastmod>2026-05-13T10:49:17.452Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/how-missing-checksum-validation-opens-the-door-to-supply-chain-attacks-20260513</loc>
<lastmod>2026-05-13T10:44:40.085Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-kernel-buffer-overflow-fixed-how-strcpy-can-hand-attackers-the-keys-to-your-system-20260513</loc>
<lastmod>2026-05-13T10:38:52.456Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-heap-buffer-overflow-in-firmware-audio-processing-how-a-missing-bounds-check-could-let-atta-20260513</loc>
<lastmod>2026-05-13T10:38:16.120Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/buffer-overflow-alert-fixing-unbounded-sprintf-calls-in-cd-rom-image-handling-20260512</loc>
<lastmod>2026-05-12T19:16:01.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-enc28j60-ethernet-driver-how-a-single-memcpy-can-compromise-embedded-dev-20260512</loc>
<lastmod>2026-05-12T19:13:36.932Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/unauthenticated-internal-metrics-endpoints-a-silent-recon-gateway-20260512</loc>
<lastmod>2026-05-12T07:00:14.045Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-crsf-firmware-how-one-missing-check-could-crash-a-drone-20260512</loc>
<lastmod>2026-05-12T06:24:00.211Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-os-command-injection-fixed-in-ota-batch-deployment-script-20260512</loc>
<lastmod>2026-05-12T06:23:28.517Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/unauthenticated-debug-endpoints-expose-firmware-internals-a-high-severity-fix-20260512</loc>
<lastmod>2026-05-12T06:22:48.744Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-os-command-injection-fixed-in-easyspiders-patcherpy-20260512</loc>
<lastmod>2026-05-12T06:02:30.794Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-ddp-network-stack-how-a-missing-bounds-check-could-hand-attackers-kernel-20260511</loc>
<lastmod>2026-05-11T18:48:16.001Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-fixed-how-strcpy-almost-broke-everything-20260511</loc>
<lastmod>2026-05-11T17:08:39.768Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/stack-buffer-overflow-in-amigaos-c-code-how-strcpy-almost-became-a-backdoor-20260511</loc>
<lastmod>2026-05-11T17:08:07.356Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-nes-emulator-how-unbounded-memcpy-puts-systems-at-risk-20260511</loc>
<lastmod>2026-05-11T17:08:01.449Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/shell-injection-in-sphinx-extensions-how-a-docs-tool-became-a-security-risk-20260511</loc>
<lastmod>2026-05-11T17:07:02.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-matfuncc-how-unvalidated-memcpy-lengths-enable-heap-corruption-20260511</loc>
<lastmod>2026-05-11T17:06:35.255Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/heap-buffer-overflow-in-ssltls-when-proto-length-goes-wrong-20260511</loc>
<lastmod>2026-05-11T17:05:58.362Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/kernel-buffer-overflow-fixed-how-unchecked-memcpy-threatened-system-integrity-20260511</loc>
<lastmod>2026-05-11T15:41:57.442Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/path-traversal-in-patch-utilities-how-a-missing-validation-let-attackers-write-anywhere-20260511</loc>
<lastmod>2026-05-11T05:59:46.905Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-opencstlh-how-unchecked-memcpy-kills-security-20260511</loc>
<lastmod>2026-05-11T05:42:37.073Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/shell-injection-via-ossystem-how-unsanitized-input-becomes-a-command-execution-nightmare-20260511</loc>
<lastmod>2026-05-11T04:29:39.066Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-kernel-fat32-out-of-bounds-write-ring-0-code-execution-20260510</loc>
<lastmod>2026-05-10T15:53:52.872Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-strcpy-how-unbounded-copies-crash-systems-20260510</loc>
<lastmod>2026-05-10T15:51:45.526Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-heap-exploitation-chain-in-triec-how-memory-bugs-become-full-compromise-20260510</loc>
<lastmod>2026-05-10T15:39:32.745Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/stack-buffer-overflow-in-odbc-connection-strings-a-critical-c-vulnerability-fixed-20260510</loc>
<lastmod>2026-05-10T03:17:42.698Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/stack-buffer-overflow-in-gspawnc-how-sprintf-can-lead-to-remote-code-execution-20260510</loc>
<lastmod>2026-05-10T03:15:24.558Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/fixing-null-pointer-dereference-in-emmc-memory-allocation-20260510</loc>
<lastmod>2026-05-10T03:15:12.406Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-cachec-how-unsigned-integer-underflow-opens-the-door-to-remote-code-exec-20260509</loc>
<lastmod>2026-05-09T14:37:17.953Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/stack-buffer-overflow-in-c-print-module-how-strcpy-almost-broke-everything-20260509</loc>
<lastmod>2026-05-09T14:36:49.112Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/heap-buffer-overflow-in-blobcpp-how-unchecked-memcpy-calls-create-critical-vulnerabilities-20260509</loc>
<lastmod>2026-05-09T14:36:39.099Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/shell-script-json-injection-when-printf-becomes-a-security-risk-20260509</loc>
<lastmod>2026-05-09T14:35:36.157Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/command-injection-via-shelltrue-how-one-flag-opens-the-door-to-os-takeover-20260509</loc>
<lastmod>2026-05-09T14:33:58.207Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/silent-data-destruction-the-hidden-danger-in-upload-price-tier-logic-20260509</loc>
<lastmod>2026-05-09T14:27:24.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/heap-buffer-overflow-in-meltedforge-array-insert-critical-fix-20260509</loc>
<lastmod>2026-05-09T14:21:02.327Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/use-after-free-in-windows-icmp-processing-a-race-to-heap-corruption-20260509</loc>
<lastmod>2026-05-09T01:46:11.041Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-restore-utility-how-unbounded-strcpy-leads-to-code-execution-20260508</loc>
<lastmod>2026-05-08T13:21:42.090Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-scram-sha-256-how-unchecked-memcpy-calls-put-your-database-proxy-at-risk-20260508</loc>
<lastmod>2026-05-08T13:21:12.698Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-shadowsockr-how-memcpy-became-a-security-nightmare-20260508</loc>
<lastmod>2026-05-08T13:20:39.480Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/ldap-injection-in-apache-airflow-how-a-missing-escape-nearly-opened-the-gates-20260508</loc>
<lastmod>2026-05-08T00:33:03.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-rce-in-handlebarsjs-how-cve-2026-33937-was-fixed-20260508</loc>
<lastmod>2026-05-08T00:30:01.389Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-uac-pipe-hijacking-when-rand-opens-the-door-to-system-20260508</loc>
<lastmod>2026-05-08T00:17:54.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-buffer-overflow-in-libretrocoreoptionsh-how-strcpy-can-lead-to-arbitrary-code-execution-20260507</loc>
<lastmod>2026-05-07T12:04:07.449Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/slidev-resolver-vulnerability-when-themes-become-trojan-horses-20260507</loc>
<lastmod>2026-05-07T11:57:18.518Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/securing-mqtt-on-embedded-devices-resource-limits-auth-fixes-20260507</loc>
<lastmod>2026-05-07T11:56:53.589Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/command-injection-in-python-packaging-scripts-how-shell-metacharacters-can-compromise-your-build-pip-20260506</loc>
<lastmod>2026-05-06T23:29:02.255Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-cve-2025-9287-how-cipher-base-hash-manipulation-puts-your-app-at-risk-20260506</loc>
<lastmod>2026-05-06T23:18:03.547Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/supply-chain-attack-via-unsafe-subprocess-in-cicd-hooks-fixed-20260506</loc>
<lastmod>2026-05-06T11:11:36.077Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/silent-code-injection-how-missing-signature-verification-defeats-checksum-security-20260506</loc>
<lastmod>2026-05-06T11:10:44.885Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/securing-iot-ota-servers-fixing-unauthenticated-firmware-uploads-20260504</loc>
<lastmod>2026-05-04T01:10:28.234Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-file-upload-vulnerability-fixed-how-unrestricted-uploads-put-flask-apis-at-risk-20260503</loc>
<lastmod>2026-05-03T00:32:52.405Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/sql-injection-in-oceanbase-connector-how-f-strings-can-sink-your-rag-platform-20260430</loc>
<lastmod>2026-04-30T10:59:42.454Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/double-free-heap-corruption-in-windows-clipboard-handler-a-critical-memory-safety-vulnerability-20260429</loc>
<lastmod>2026-04-29T06:22:44.904Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/github-actions-shell-injection-how-can-betray-your-cicd-pipeline-20260427</loc>
<lastmod>2026-04-27T15:14:59.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-heap-buffer-overflow-fixed-in-geoip-database-parser-20260425</loc>
<lastmod>2026-04-25T16:38:00.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/stack-buffer-overflow-in-c-grpc-server-how-sprintf-enables-code-execution-20260423</loc>
<lastmod>2026-04-23T03:07:25.552Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/decrypted-secrets-in-plain-sight-fixing-aes-log-exposure-in-java-20260423</loc>
<lastmod>2026-04-23T03:06:38.447Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/github-actions-shell-injection-how-context-variables-can-compromise-your-cicd-pipeline-20260422</loc>
<lastmod>2026-04-22T14:53:22.262Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/github-actions-shell-injection-how-variables-can-compromise-your-cicd-pipeline-20260420</loc>
<lastmod>2026-04-20T22:54:06.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/github-actions-shell-injection-how-variables-can-hijack-your-cicd-pipeline-20260420</loc>
<lastmod>2026-04-20T22:53:11.211Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/heap-buffer-overflow-in-giflib-when-gif-images-become-attack-vectors-20260420</loc>
<lastmod>2026-04-20T05:33:29.880Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-command-injection-fix-how-ossystem-put-aws-workflows-at-risk-20260416</loc>
<lastmod>2026-04-16T16:09:01.555Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/cve-2025-7783-critical-form-data-unsafe-randomness-vulnerability-fixed-20260415</loc>
<lastmod>2026-04-15T08:10:19.393Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-command-injection-fixed-in-python-test-script-20260413</loc>
<lastmod>2026-04-13T00:47:03.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-github-api-token-exposure-securing-secrets-in-octokit-applications-20260412</loc>
<lastmod>2026-04-12T01:17:43.602Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-shell-injection-flaw-in-github-actions-how-to-secure-your-cicd-20260408</loc>
<lastmod>2026-04-08T08:34:20.294Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-use-after-free-in-esp32-display-buffer-a-memory-safety-deep-dive-20260403</loc>
<lastmod>2026-04-03T20:06:39.864Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-command-injection-flaw-fixed-in-python-cli-script-20260403</loc>
<lastmod>2026-04-03T08:00:43.002Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/subprocess-security-fixing-command-injection-risks-in-python-scripts-20260328</loc>
<lastmod>2026-03-28T08:44:32.479Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/command-injection-in-ossfs-how-unsafe-subprocessrun-calls-threaten-your-file-system-20260328</loc>
<lastmod>2026-03-28T08:44:03.665Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/path-traversal-meets-dependency-vulnerabilities-a-two-front-security-fix-20260328</loc>
<lastmod>2026-03-28T08:43:55.566Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/infinite-loop-vulnerability-in-file-type-asf-parser-cve-2026-31808-explained-20260328</loc>
<lastmod>2026-03-28T08:43:39.083Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/jwt-authentication-vulnerability-how-weak-token-validation-exposed-dashboard-apis-20260328</loc>
<lastmod>2026-03-28T08:43:14.699Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/plaintext-oauth-token-storage-a-medium-severity-vulnerability-fix-20260328</loc>
<lastmod>2026-03-28T08:39:05.448Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/plaintext-oauth-token-storage-a-silent-security-risk-in-your-application-20260328</loc>
<lastmod>2026-03-28T08:37:59.894Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/oauth-tokens-exposed-why-plaintext-credential-storage-is-a-critical-mistake-20260328</loc>
<lastmod>2026-03-28T08:37:37.678Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/plaintext-oauth-tokens-a-critical-security-flaw-in-credential-storage-20260328</loc>
<lastmod>2026-03-28T08:37:37.236Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/unbounded-recursion-in-python-protobuf-a-medium-severity-dos-vulnerability-20260325</loc>
<lastmod>2026-03-25T02:38:13.839Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/preventing-dos-attacks-fixing-resource-exhaustion-in-file-import-systems-20260319</loc>
<lastmod>2026-03-19T06:37:36.512Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/defending-against-rate-limit-bypass-securing-express-applications-from-ip-spoofing-20260319</loc>
<lastmod>2026-03-19T06:25:58.001Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/dont-trust-verify-fixing-a-critical-jwt-signature-forgery-flaw-20260319</loc>
<lastmod>2026-03-19T05:58:19.212Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/sql-injection-prevention-moving-from-string-formatting-to-parameterized-queries-20260319</loc>
<lastmod>2026-03-19T05:55:57.312Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/wildcard-postmessage-leak-how-one-character-exposed-user-sessions-20260306</loc>
<lastmod>2026-03-06T06:05:27.120Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/fixing-session-hijacking-from-insecure-query-parameters-to-secure-sessions-20260306</loc>
<lastmod>2026-03-06T06:04:50.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/urllib3-redirect-vulnerability-how-uncontrolled-redirects-put-your-application-at-risk-20260306</loc>
<lastmod>2026-03-06T06:04:07.882Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/google-oauth-token-exposure-how-a-leaked-access-token-put-api-security-at-risk-20260306</loc>
<lastmod>2026-03-06T06:03:31.587Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/why-strtok-is-dangerous-a-critical-security-fix-in-libscram-20260306</loc>
<lastmod>2026-03-06T06:02:55.793Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/insecure-websocket-vulnerability-why-wss-should-always-replace-ws-20260306</loc>
<lastmod>2026-03-06T06:02:19.317Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/the-hidden-danger-of-iterating-over-empty-maps-in-go-applications-20260306</loc>
<lastmod>2026-03-06T06:00:59.542Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/jwt-algorithm-confusion-how-a-missing-parameter-can-compromise-authentication-20260306</loc>
<lastmod>2026-03-06T05:50:54.137Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/path-traversal-in-node-tar-how-hardlink-bypass-exposed-your-files-20260306</loc>
<lastmod>2026-03-06T05:50:16.932Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/path-traversal-in-node-tar-how-a-hardlink-bypass-exposed-file-systems-20260306</loc>
<lastmod>2026-03-06T05:49:27.814Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/node-tar-path-traversal-how-a-hardlink-bypass-threatened-file-systems-20260306</loc>
<lastmod>2026-03-06T05:48:34.595Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-path-traversal-in-node-tar-how-a-hardlink-bypass-put-files-at-risk-20260306</loc>
<lastmod>2026-03-06T05:47:50.161Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-path-traversal-fix-how-node-tar-hardlink-vulnerability-was-patched-20260306</loc>
<lastmod>2026-03-06T05:47:12.774Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/critical-path-traversal-in-node-tar-how-hardlink-bypass-enabled-arbitrary-file-creation-20260306</loc>
<lastmod>2026-03-06T05:46:32.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/node-tar-path-traversal-how-unicode-collisions-bypass-security-checks-20260306</loc>
<lastmod>2026-03-06T05:45:45.962Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://orbisappsec.com/blog/unpacking-the-danger-fixing-node-tars-path-traversal-vulnerability-20260213</loc>
<lastmod>2026-02-13T15:53:50.443Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
