<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//ms-infra.de/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://ms-infra.de/cve-2026-7339-google-chrome-webrtc-heap-buffer-overflow-vulnerability/</loc>
		<lastmod>2026-04-29T00:18:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7340-google-chrome-angle-integer-overflow-memory-read/</loc>
		<lastmod>2026-04-29T00:18:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7341-google-chrome-webrtc-use-after-free-vulnerability/</loc>
		<lastmod>2026-04-29T00:18:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7342-google-chrome-android-webview-use-after-free-arbitrary-code-execution/</loc>
		<lastmod>2026-04-29T00:18:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7343-google-chrome-use-after-free-in-views-on-windows/</loc>
		<lastmod>2026-04-29T00:18:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7344-google-chrome-use-after-free-in-accessibility-on-windows/</loc>
		<lastmod>2026-04-29T00:18:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7345-google-chrome-renderer-process-sandbox-escape/</loc>
		<lastmod>2026-04-29T00:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7346-google-chrome-tint-out-of-bounds-memory-access-vulnerability/</loc>
		<lastmod>2026-04-29T00:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7347-google-chrome-chromium-use-after-free-remote-code-execution/</loc>
		<lastmod>2026-04-29T00:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7348-google-chrome-codecs-use-after-free-arbitrary-code-execution-vulnerability/</loc>
		<lastmod>2026-04-29T00:18:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7349-google-chrome-use-after-free-arbitrary-code-execution-vulnerability/</loc>
		<lastmod>2026-04-29T00:18:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7350-google-chrome-webmidi-use-after-free-vulnerability/</loc>
		<lastmod>2026-04-29T00:18:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7351-google-chrome-mhtml-cross-origin-data-leak-vulnerability/</loc>
		<lastmod>2026-04-29T00:18:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7352-google-chrome-android-media-use-after-free-sandbox-escape/</loc>
		<lastmod>2026-04-29T00:18:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7353-google-chrome-skia-heap-buffer-overflow/</loc>
		<lastmod>2026-04-29T00:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7354-google-chrome-angle-out-of-bounds-write-vulnerability/</loc>
		<lastmod>2026-04-29T00:17:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7355-google-chrome-media-use-after-free-vulnerability/</loc>
		<lastmod>2026-04-29T00:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7356-google-chrome-use-after-free-vulnerability-in-navigation/</loc>
		<lastmod>2026-04-29T00:17:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7357-google-chrome-gpu-use-after-free-vulnerability/</loc>
		<lastmod>2026-04-29T00:17:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7358-google-chrome-use-after-free-in-animation-vulnerability/</loc>
		<lastmod>2026-04-29T00:17:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7359-google-chrome-angle-use-after-free-sandbox-escape/</loc>
		<lastmod>2026-04-29T00:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7361-google-chrome-ios-use-after-free-heap-corruption/</loc>
		<lastmod>2026-04-29T00:17:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7360-google-chrome-site-isolation-bypass/</loc>
		<lastmod>2026-04-29T00:17:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7363-google-chrome-canvas-use-after-free-vulnerability/</loc>
		<lastmod>2026-04-29T00:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-40560-starman-versions-before-0-4018-for-perl-allows-http-request-smuggling-via-improper-header-precedence/</loc>
		<lastmod>2026-04-29T00:17:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7314-eiceblue-spire-doc-mcp-server-base-py-get_doc_path-path-traversal/</loc>
		<lastmod>2026-04-28T22:17:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7315-eiceblue-spire-pdf-mcp-server-pdf-file-server-py-get_pdf_path-path-traversal/</loc>
		<lastmod>2026-04-28T22:17:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-41649-outline-has-idor-in-document-share-creation-that-allows-unauthorized-access-to-private-documents-across-workspaces/</loc>
		<lastmod>2026-04-28T22:17:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7316-eiliyaabedini-aider-mcp-code_with_ai-aider_mcp-py-command-injection/</loc>
		<lastmod>2026-04-28T22:17:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7317-grav-cms-cache-value-filecache-php-doget-deserialization/</loc>
		<lastmod>2026-04-28T22:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7318-elie-mcp-project-research_server-py-search_papers-path-traversal/</loc>
		<lastmod>2026-04-28T22:17:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-7319-elinsky-execution-system-mcp-add_action-tool-server-py-_get_context_file_path-path-traversal/</loc>
		<lastmod>2026-04-28T22:17:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-41446-wattbox-800-820-series-2-10-0-0-rce-via-diagnostic-endpoints/</loc>
		<lastmod>2026-04-28T22:17:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/cve-2026-33467-improper-verification-of-cryptographic-signature-in-elastic-package-registry-leading-to-package-integrity-bypass/</loc>
		<lastmod>2026-04-28T22:17:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/update-mittel-red-hat-enterprise-linux-schwachstelle-ermoeglicht-codeausfuehrung/</loc>
		<lastmod>2025-06-27T06:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/update-mittel-google-chrome-microsoft-edge-mehrere-schwachstellen/</loc>
		<lastmod>2025-06-27T05:53:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/update-hoch-winrar-schwachstelle-ermoeglicht-codeausfuehrung/</loc>
		<lastmod>2025-06-27T05:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/update-hoch-mcafee-agent-mehrere-schwachstellen/</loc>
		<lastmod>2025-06-27T04:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/schreinerei-geschaeft/</loc>
		<lastmod>2025-06-26T21:34:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/fliesen-betz-gmbh-co-kg/</loc>
		<lastmod>2025-06-26T21:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/rezension-fuer-manuel-it-dienstleistungen/</loc>
		<lastmod>2025-06-26T21:34:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ms-infra.de/reifenhandel-heiko-betz/</loc>
		<lastmod>2025-06-26T21:34:20+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->