<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://vulnerability.blog/2025/10/13/geopolitics-and-open-source-kym-know-your-maintainers/</loc><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/10/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-13T14:16:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulnerability.blog/2025/01/14/2024-cves-in-review/</loc><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image.jpg</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-14.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-16T06:10:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulnerability.blog/2025/01/15/medium-jenkins-service-crash-vulnerability/</loc><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/jenkins-pic.jpg</image:loc><image:title>jenkins pic</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-17.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-16T01:04:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulnerability.blog/2025/01/06/vulnerabilities-cves-reserved-per-year-as-a-proxy-for-us-economic-conditions-and-outlook/</loc><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/cves-per-year-updated-1.png</image:loc><image:title>CVEs-per-year-updated</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/cves-per-year-updated.png</image:loc><image:title>CVEs-per-year-updated</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-16.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/cves-per-year.png</image:loc><image:title>CVEs-per-year</image:title></image:image><lastmod>2025-01-07T03:45:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulnerability.blog/2025/01/02/chatgpt-a-security-researcher-pen-testers-ultimate-sidekick/</loc><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/chatgpt-article-1.png</image:loc><image:title>chatgpt-article</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/chatgpt-article.png</image:loc><image:title>chatgpt-article</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-11.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2025/01/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-03T02:33:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulnerability.blog/about/</loc><lastmod>2024-12-29T18:36:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://vulnerability.blog/2024/12/28/osint-sherlock-project-username-finder-review-deep-dive-and-improvements/</loc><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2024/12/image-29.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-12-29T03:25:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulnerability.blog/2024/12/22/proving-and-disproving-assumptions/</loc><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2024/12/image-28.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2024/12/image-27.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2024/12/image-26.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://vulnerability.blog/wp-content/uploads/2024/12/image-25.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-12-28T22:38:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://vulnerability.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-10-13T14:16:24+00:00</lastmod></url></urlset>
