<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidades-gemini-cli-cursor-ide-ai-seguridad/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidades críticas en Gemini CLI y Cursor IDE: RCE en CI/CD y riesgo para la cadena de suministro de software]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritichna-urazlyvist-gemini-cli-ta-ai-ide-cursor/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість Gemini CLI та AI‑IDE Cursor]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/kritische-rce-sicherheitsluecke-in-google-gemini-cli-und-neue-angriffsvektoren-in-der-ai-ide-cursor/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische RCE-Sicherheitsluecke in Google Gemini CLI und neue Angriffsvektoren in der AI-IDE Cursor]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/gemini-cli-cursor-ide-critical-ai-security-vulnerabilities/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical Gemini CLI and Cursor IDE Vulnerabilities Expose AI Development Security Risks]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-gemini-cli-i-cursor-rce-v-ci-cd/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая уязвимость в Google Gemini CLI и AI‑IDE Cursor: риск удалённого выполнения кода в CI/CD]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/copy-fail-cve-2026-31431-vulnerabilidad-kernel-linux/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T15:12:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidad Copy Fail (CVE-2026-31431) en el kernel de Linux: análisis, impacto y mitigación]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/copy-fail-cve-2026-31431-linux-lpe/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T15:12:00+00:00</news:publication_date>
			<news:title><![CDATA[Copy Fail (CVE-2026-31431): критична уразливість ядра Linux для локального підвищення привілеїв]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/linux-kernel-sicherheitsluecke-copy-fail-cve-2026-31431/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T15:12:00+00:00</news:publication_date>
			<news:title><![CDATA[Linux-Kernel-Sicherheitsluecke Copy Fail (CVE-2026-31431) erklaert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/copy-fail-cve-2026-31431-linux-kernel-privilege-escalation/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T15:12:00+00:00</news:publication_date>
			<news:title><![CDATA[Copy Fail (CVE-2026-31431): New Linux Kernel Privilege Escalation Vulnerability Exposes Root Access]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/linux-lpe-copy-fail-cve-2026-31431/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T15:12:00+00:00</news:publication_date>
			<news:title><![CDATA[Copy Fail (CVE-2026-31431): новая критическая уязвимость ядра Linux для локального повышения привилегий]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kiberataka-checkmarx-dark-web-supply-chain-2026/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:15:00+00:00</news:publication_date>
			<news:title><![CDATA[Кибератака на Checkmarx: утечка данных через supply chain и публикация на даркнете]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ataque-supply-chain-checkmarx-dark-web-devsecops/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:15:00+00:00</news:publication_date>
			<news:title><![CDATA[Ataque a la cadena de suministro contra Checkmarx: filtración en la Dark Web y riesgos para DevSecOps]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/supply-chain-ataka-na-checkmarx-dark-web-devsecops/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:15:00+00:00</news:publication_date>
			<news:title><![CDATA[Supply chain-атака на Checkmarx: витік даних на Dark Web та ризики для DevSecOps]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/checkmarx-supply-chain-angriff-github-datenleck/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:15:00+00:00</news:publication_date>
			<news:title><![CDATA[Supply-Chain-Angriff auf Checkmarx: Was hinter dem GitHub-Datenleck steckt und wie sich DevOps-Teams schützen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/checkmarx-supply-chain-attack-dark-web-data-leak/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:15:00+00:00</news:publication_date>
			<news:title><![CDATA[Checkmarx Supply Chain Attack and Dark Web Data Leak: What DevSecOps Teams Must Know]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidad-critica-litellm-cve-2026-42208-sql-injection/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidad crítica en LiteLLM (CVE‑2026‑42208): SQL injection en pasarela de IA ya está siendo explotada]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychna-urazlyvist-cve-2026-42208-litellm-sql-iniektsiia/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість CVE-2026-42208 в LiteLLM: активна експлуатація SQL-інʼєкції в AI‑шлюзі]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/litellm-cve-2026-42208-sql-injection-ai-gateway/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[LiteLLM Sicherheitsluecke CVE-2026-42208: Kritische SQL-Injection im AI-Gateway]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/litellm-cve-2026-42208-sql-injection-ai-gateway/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical LiteLLM Vulnerability CVE-2026-42208: SQL Injection in AI Gateway Under Active Exploitation]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-litellm-sql-injektsiya-cve-2026-42208/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая уязвимость LiteLLM CVE-2026-42208: SQL-инъекция в AI gateway уже эксплуатируется]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/critica-vulnerabilidad-autenticacion-cpanel-actualizacion-seguridad/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Crítica vulnerabilidad de autenticación en cPanel: parches de seguridad y medidas urgentes]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritichna-urazlivist-v-cpanel-onovlennya-bezpeky-namecheap/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість в cPanel: оновлення безпеки, дії Namecheap та рекомендації з кіберзахисту]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/kritische-cpanel-sicherheitsluecke-authentifizierung-namecheap-ports-2083-2087/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische cPanel-Sicherheitsluecke: Authentifizierungs-Exploit zwingt Hosting-Anbieter zu Notmassnahmen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cpanel-critical-authentication-vulnerability-namecheap-response/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical cPanel Authentication Vulnerability: Namecheap Response and Security Guidance]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/uyazvimost-cpanel-eksployt-autentifikacii-namecheap/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Уязвимость cPanel: эксплойт аутентификации и меры Namecheap по защите клиентов]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/microsoft-entra-agent-id-administrator-privilege-escalation/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Уязвимость в Microsoft Entra ID: эскалация привилегий через роль Agent ID Administrator]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidad-agent-id-administrator-microsoft-entra-id/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidad en Microsoft Entra ID permite escalada de privilegios vía rol Agent ID Administrator]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/urazlyvist-agent-id-administrator-microsoft-entra-id/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Уразливість Agent ID Administrator у Microsoft Entra ID: ризики ескалації привілеїв через service principal]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/microsoft-entra-id-sicherheitsluecke-agent-id-administrator-service-principal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Entra ID Sicherheitsluecke: Agent ID Administrator ermoeglichte Uebernahme von Service Principals]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/microsoft-entra-id-agent-id-administrator-vulnerability/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Entra ID Vulnerability in Agent ID Administrator Role Enabled Service Principal Takeover]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->