<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 14, 2026 at 12:59 pm by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.action1.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Action1</title>
		<link><![CDATA[https://www.action1.com]]></link>
		<description><![CDATA[Action1]]></description>
		<lastBuildDate><![CDATA[Tue, 14 Apr 2026 13:11:33 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.action1.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.action1.com/documentation/managing-roles/creating-a-role/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/managing-roles/creating-a-role/]]></link>
			<title>Creating a Role</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:11:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/working-with-reports/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/working-with-reports/]]></link>
			<title>Working with Reports</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/using-scripts/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/using-scripts/]]></link>
			<title>Using Scripts</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:03:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/scheduling-reports-delivery/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/scheduling-reports-delivery/]]></link>
			<title>Scheduling Reports Delivery</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 12:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/]]></guid>
			<link><![CDATA[https://www.action1.com/]]></link>
			<title>Action1 Homepage</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 16:05:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/action1-qualys-integration/]]></guid>
			<link><![CDATA[https://www.action1.com/action1-qualys-integration/]]></link>
			<title>Qualys + Action1 for Faster Vulnerability Remediation and Patch Management</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 16:41:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-15576/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-15576/]]></link>
			<title>CVE-2025-15576 &#8211; FreeBSD Jail Escape via File Descriptor Exchange</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2021-22681/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2021-22681/]]></link>
			<title>CVE-2021-22681 &#8211; Rockwell Automation Studio 5000 Logix Designer</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13942/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13942/]]></link>
			<title>CVE-2025-13942 &#8211; Zyxel Networking Firmware Command Injection &#038; Remote Code Execution Fixes</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25108/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25108/]]></link>
			<title>CVE-2026-25108 &#8211; FileZen OS Command Injection Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-10010/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-10010/]]></link>
			<title>CVE-2025-10010 &#8211; CryptoPro Secure Disk for BitLocker Integrity Validation Bypass</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13818/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13818/]]></link>
			<title>CVE-2025-13818 &#8211; ESET Management Agent for Windows Security Update</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-11730/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-11730/]]></link>
			<title>CVE-2025-11730 &#8211; Zyxel ATP &#038; USG Series Security Update</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-64127/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-64127/]]></link>
			<title>CVE-2025-64127 &#8211; Zenitel Intercom &#038; IP Audio Systems Security Update</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25646/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25646/]]></link>
			<title>CVE-2026-25646 &#8211; libpng Memory Corruption Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-0969/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-0969/]]></link>
			<title>CVE-2026-0969 &#8211; next-mdx Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1670/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1670/]]></link>
			<title>CVE-2026-1670 &#8211; Honeywell CCTV Improper Authentication Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1774/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1774/]]></link>
			<title>CVE-2026-1774 &#8211; CASL Ability Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25639/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25639/]]></link>
			<title>CVE-2026-25639 &#8211; Axios Server-Side Request Forgery Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-14914/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-14914/]]></link>
			<title>CVE-2025-14914 &#8211; IBM WebSphere Information Disclosure Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-15566/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-15566/]]></link>
			<title>CVE-2025-15566 &#8211; Ingress-NGINX Kubernetes Controller Security Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-24763/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-24763/]]></link>
			<title>CVE-2026-24763 &#8211; OpenClaw Command Injection Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2020-37078/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2020-37078/]]></link>
			<title>CVE-2020-37078 &#8211; i-doit CMDB Arbitrary File Deletion Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25643/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25643/]]></link>
			<title>CVE-2026-25643 &#8211; Frigate Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25544/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25544/]]></link>
			<title>CVE-2026-25544 &#8211; Payload CMS Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-64712/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-64712/]]></link>
			<title>CVE-2025-64712 &#8211; Unstructured.io Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2021-26381/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2021-26381/]]></link>
			<title>CVE-2021-26381 &#8211; AMD Graphics Driver Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13375/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13375/]]></link>
			<title>CVE-2025-13375 &#8211; IBM Common Cryptographic Architecture Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2020-37070/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2020-37070/]]></link>
			<title>CVE-2020-37070 &#8211; CloudMe Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2020-37119/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2020-37119/]]></link>
			<title>CVE-2020-37119 &#8211; Nsauditor Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-23515/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-23515/]]></link>
			<title>CVE-2026-23515 &#8211; Signal K Server Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25592/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25592/]]></link>
			<title>CVE-2026-25592 &#8211; Microsoft Semantic Kernel Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2020-37066/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2020-37066/]]></link>
			<title>CVE-2020-37066 &#8211; GoldWave Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-20140/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-20140/]]></link>
			<title>CVE-2026-20140 &#8211; Splunk Enterprise Security Update</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2021-22175/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2021-22175/]]></link>
			<title>CVE-2021-22175 &#8211; GitLab Server-Side Request Forgery</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-29969/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-29969/]]></link>
			<title>CVE-2025-29969 &#8211; Microsoft Windows Fundamentals Security Update</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-67813/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-67813/]]></link>
			<title>CVE-2025-67813 &#8211; Quest Desktop Authority Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-6978/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-6978/]]></link>
			<title>CVE-2025-6978 &#8211; Arista NG Firewall Command Injection Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25926/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25926/]]></link>
			<title>CVE-2026-25926 &#8211; Notepad++ Security Update</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-20119/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-20119/]]></link>
			<title>CVE-2026-20119 &#8211; Cisco TelePresence Remote Command Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-22548/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-22548/]]></link>
			<title>CVE-2026-22548 &#8211; F5 BIG-IP Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1642/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1642/]]></link>
			<title>CVE-2026-1642 &#8211; F5 NGINX OSS Denial of Service Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1591/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1591/]]></link>
			<title>CVE-2026-1591 &#8211; Foxit PDF Editor Cloud Stored Cross-Site Scripting Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13379-ibm-aspera-faspex-improper-access-control-vulnerability/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13379-ibm-aspera-faspex-improper-access-control-vulnerability/]]></link>
			<title>CVE-2025-13379 &#8211; IBM Aspera Faspex Improper Access Control Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-24512/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-24512/]]></link>
			<title>CVE-2026-24512 &#8211; Ingress-NGINX Improper Request Handling Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-0709/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-0709/]]></link>
			<title>CVE-2026-0709 &#8211; Hikvision Wireless Access Point Authenticated Command Execution</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25200/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25200/]]></link>
			<title>CVE-2026-25200 &#8211; Samsung MagicINFO 9 Server Multiple Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2023-27532/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2023-27532/]]></link>
			<title>CVE-2023-27532 &#8211; Veeam Backup &#038; Replication Security Update</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-49113/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-49113/]]></link>
			<title>CVE-2025-49113 &#8211; Roundcube Webmail Remote Code Execution and Cross-Site Scripting Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2017-7921/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2017-7921/]]></link>
			<title>CVE-2017-7921 &#8211; Hikvision IP Cameras, DVRs, and NVR Devices Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:24:36 +0000]]></pubDate>
		</item>
				</channel>
</rss>
