<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 20, 2026 at 10:52 am by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.action1.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Action1</title>
		<link><![CDATA[https://www.action1.com]]></link>
		<description><![CDATA[Action1]]></description>
		<lastBuildDate><![CDATA[Wed, 15 Apr 2026 17:24:11 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.action1.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.action1.com/webinars/vulnerability-digest-from-action1/]]></guid>
			<link><![CDATA[https://www.action1.com/webinars/vulnerability-digest-from-action1/]]></link>
			<title>Vulnerability Digest from Action1</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 17:24:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/why-most-patch-slas-fail-against-real-world-exploitation-timeline/]]></guid>
			<link><![CDATA[https://www.action1.com/why-most-patch-slas-fail-against-real-world-exploitation-timeline/]]></link>
			<title>Why Most Patch SLAs Fail Against Real-World Exploitation Timeline</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 17:20:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/patch-tuesday/patch-tuesday-april-2026/]]></guid>
			<link><![CDATA[https://www.action1.com/patch-tuesday/patch-tuesday-april-2026/]]></link>
			<title>Patch Tuesday April 2026</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 17:15:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/reports-and-update-statistic/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/reports-and-update-statistic/]]></link>
			<title>Installed Updates and Reports</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:54:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/vulnerability-management/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/vulnerability-management/]]></link>
			<title>Vulnerability Management</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 13:30:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/blog/automating-action1-agent-management-in-intune-keep-your-action1-agent-always-up-to-date/]]></guid>
			<link><![CDATA[https://www.action1.com/blog/automating-action1-agent-management-in-intune-keep-your-action1-agent-always-up-to-date/]]></link>
			<title>Automating Action1 Agent Management in Intune: Keep Your Action1 Agent Always Up to Date</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:38:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/microsoft-defender-action1-integration/]]></guid>
			<link><![CDATA[https://www.action1.com/microsoft-defender-action1-integration/]]></link>
			<title>Microsoft Defender &#038; Action1 Integration</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:21:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/blog/action1-vs-manageengine-endpoint-central-cloud-vs-on-premise-platform-comparison/]]></guid>
			<link><![CDATA[https://www.action1.com/blog/action1-vs-manageengine-endpoint-central-cloud-vs-on-premise-platform-comparison/]]></link>
			<title>Action1 vs ManageEngine Endpoint Central Cloud vs On-Premise: Platform Comparison</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/ms-intune-action1/]]></guid>
			<link><![CDATA[https://www.action1.com/ms-intune-action1/]]></link>
			<title>Enhance Your Microsoft Intune Experience with Action1</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:51:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/action1-qualys-integration/]]></guid>
			<link><![CDATA[https://www.action1.com/action1-qualys-integration/]]></link>
			<title>Qualys + Action1 for Faster Vulnerability Remediation and Patch Management</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:37:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/analyst-coverage/]]></guid>
			<link><![CDATA[https://www.action1.com/analyst-coverage/]]></link>
			<title>Analyst Coverage</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:02:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/managing-roles/creating-a-role/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/managing-roles/creating-a-role/]]></link>
			<title>Creating a Role</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:11:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/working-with-reports/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/working-with-reports/]]></link>
			<title>Working with Reports</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:07:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/using-scripts/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/using-scripts/]]></link>
			<title>Using Scripts</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:03:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/documentation/scheduling-reports-delivery/]]></guid>
			<link><![CDATA[https://www.action1.com/documentation/scheduling-reports-delivery/]]></link>
			<title>Scheduling Reports Delivery</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 12:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-68664/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-68664/]]></link>
			<title>CVE-2025-68664 &#8211; LangChain and LangGraph Security Update for Multiple Vulnerabilities</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-20817/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-20817/]]></link>
			<title>CVE-2026-20817 &#8211; Windows Error Reporting Privilege Escalation Patch</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-4276/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-4276/]]></link>
			<title>CVE-2026-4276 &#8211; LibreChat High Severity Vulnerability</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-24291/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-24291/]]></link>
			<title>CVE-2026-24291 &#8211; RegPwn</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25769/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25769/]]></link>
			<title>CVE-2026-25769 &#8211; Wazuh</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-3564/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-3564/]]></link>
			<title>CVE-2026-3564 &#8211; ConnectWise ScreenConnect Critical Vulnerability</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-22557/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-22557/]]></link>
			<title>CVE-2026-22557 &#8211; Ubiquiti</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-15517/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-15517/]]></link>
			<title>CVE-2025-15517 &#8211; TP-Link Multiple High Severity Vulnerabilities</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-53521/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-53521/]]></link>
			<title>CVE-2025-53521 &#8211; F5 BIG-IP</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-22898/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-22898/]]></link>
			<title>CVE-2026-22898 &#8211; QNAP QVR Pro</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-66176/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-66176/]]></link>
			<title>CVE-2025-66176 &#8211; Hikvision Camera Firmware</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-4404/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-4404/]]></link>
			<title>CVE-2026-4404 &#8211; Harbor Critical Vulnerability</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/]]></guid>
			<link><![CDATA[https://www.action1.com/]]></link>
			<title>Action1 Homepage</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 16:05:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/meet-action1-at-cloud-and-cyber-security-expo-frankfurt-2026/]]></guid>
			<link><![CDATA[https://www.action1.com/meet-action1-at-cloud-and-cyber-security-expo-frankfurt-2026/]]></link>
			<title>Meet Action1 at Cloud &#038; Cyber Security Expo &#8211; Frankfurt 2026</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:52:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-0628/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-0628/]]></link>
			<title>CVE-2026-0628 &#8211; Google Gemini Security Update</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:48:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-47813/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-47813/]]></link>
			<title>CVE-2025-47813 &#8211; Wing FTP Server Security Update</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:48:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-27220/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-27220/]]></link>
			<title>CVE-2026-27220 &#8211; Adobe Acrobat and Reader Security Update (March 10, 2026)</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:45:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2019-17571/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2019-17571/]]></link>
			<title>CVE-2019-17571 &#8211; SAP NetWeaver and FS-QUO Critical Deserialization and Code Injection Fix</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:45:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-27577/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-27577/]]></link>
			<title>CVE-2026-27577 &#8211; n8n Security Update for Critical Workflow Execution Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:44:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25921/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25921/]]></link>
			<title>CVE-2026-25921 &#8211; Gogs Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:43:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1603-2/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-1603-2/]]></link>
			<title>CVE-2026-1603 &#8211; Ivanti Endpoint Manager Authentication Bypass Vulnerability</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:43:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-29058/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-29058/]]></link>
			<title>CVE-2026-29058 &#8211; AVideo Platform File Upload Remote Code Execution</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25611/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-25611/]]></link>
			<title>CVE-2026-25611 &#8211; MongoDB Server Pre-Authentication Memory Exhaustion Denial of Service</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:43:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-3336/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-3336/]]></link>
			<title>CVE-2026-3336 &#8211; AWS-LC Cryptographic Validation and Timing Side-Channel</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13476/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-13476/]]></link>
			<title>CVE-2025-13476 &#8211; Viber for Android – Cloak Proxy TLS Fingerprinting Exposure</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-20079-2/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-20079-2/]]></link>
			<title>CVE-2026-20079 &#8211; Cisco Secure Firewall – Critical RCE and Active Exploitation</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-14500/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-14500/]]></link>
			<title>CVE-2025-14500 &#8211; IceWarp – X-File-Operation Command Injection Remote Code Execution Vulnerability</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-34288/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-34288/]]></link>
			<title>CVE-2025-34288 &#8211; Nagios XI – Local Privilege Escalation via Writable PHP Include</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-32647/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-32647/]]></link>
			<title>F5 NGINX &#8211; CVE-2026-32647</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-22765/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-22765/]]></link>
			<title>CVE-2026-22765 &#8211; Dell Wyse Management Suite</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-67736/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2025-67736/]]></link>
			<title>CVE-2025-67736 &#8211; FreePBX tts Module Authenticated SQL Injection</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-28289/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-28289/]]></link>
			<title>CVE-2026-28289 &#8211; FreeScout – Remote Code Execution and Patch Bypass Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-23600/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-23600/]]></link>
			<title>CVE-2026-23600 &#8211; HPE AutoPass License Server – Remote Authentication Bypass</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-21385/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-21385/]]></link>
			<title>CVE-2026-21385 &#8211; Qualcomm Graphics Component Memory Corruption</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-26133/]]></guid>
			<link><![CDATA[https://www.action1.com/vulnerabilities/cve-2026-26133/]]></link>
			<title>CVE-2026-26133 – M365 Copilot</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:41:16 +0000]]></pubDate>
		</item>
				</channel>
</rss>
