<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
        <loc>https://www.invicti.com</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/best-in-class</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/consultant-edition</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/container-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/sast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/sca</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/the-right-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/what-is-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features</loc>
    </url>
<url>
        <loc>https://www.invicti.com/internal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/contact/sales</loc>
    </url>
<url>
        <loc>https://www.invicti.com/pricing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/healthcare</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/higher-education</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/security-engineer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison/invicti-vs-acunetix</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/it-and-telecom</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison/invicti-vs-burp-suite</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison/invicti-vs-checkmarx</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/all-eyes-on-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/api-vulnerability-testing-real-world-invicti-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/appsec-indicator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/dast-ciso-security-posture-gauge</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/lets-talk-about-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/accessibility</loc>
    </url>
<url>
        <loc>https://www.invicti.com/aws-marketplace</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/additional-support</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/managed-security-service-provider</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/modern-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/resources/buyers-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/resources/gartner-magic-quadrant-ast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/security-at-the-speed-of-software</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/security-by-design</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/tag-threat-landscape</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/web-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/tag-implementing-a-dast-first-appsec-program-with-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/zero-trust-at-work</loc>
    </url>
<url>
        <loc>https://www.invicti.com/live-trainings</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/product-update-registration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/comprehensive-vulnerability-coverage</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/zero-compromise-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webcasts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/resources</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/compliance-reports/iso27001/control-objectives-and-controls</loc>
    </url>
<url>
        <loc>https://www.invicti.com/compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/compliance/california-privacy-rights</loc>
    </url>
<url>
        <loc>https://www.invicti.com/compliance/cookie-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/federal-compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/important-invicti-licensing-information</loc>
    </url>
<url>
        <loc>https://www.invicti.com/invicti-at-rsac-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/microsoft-azure-marketplace</loc>
    </url>
<url>
        <loc>https://www.invicti.com/online-web-application-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/php-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/testimonials</loc>
    </url>
<url>
        <loc>https://www.invicti.com/updating-invicti-enterprise-on-premises</loc>
    </url>
<url>
        <loc>https://www.invicti.com/use-cases/external-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/website-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/penetration-testing-software</loc>
    </url>
<url>
        <loc>https://www.invicti.com/rsac24</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/good-habits-of-bad-actors-ebook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/zero-trust-in-action</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/automated-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/customers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/partners</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/proof-based-scanning-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/speed-vs-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/reduce-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/videos</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/devsecops</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/engineering-manager</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/cto-ciso</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/government</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/financial-services</loc>
    </url>
<url>
        <loc>https://www.invicti.com/careers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/compliance/privacy-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn</loc>
    </url>
<url>
        <loc>https://www.invicti.com/contact</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/gartner-aspm-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/what-is-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/about</loc>
    </url>
<url>
        <loc>https://www.invicti.com/careers/open-positions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/infosec-europe-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-application-security-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories</loc>
    </url>
<url>
        <loc>https://www.invicti.com/awards-and-press</loc>
    </url>
<url>
        <loc>https://www.invicti.com/resources/api-security-resources</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/ai-powered-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison/invicti-vs-nessus</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison/invicti-vs-owasp-zap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison/invicti-vs-probely</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison/invicti-vs-qualys</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/ssa</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/sla</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/aup</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/standard-support</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/dpa</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/terms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/invicti-on-demand-demo-video</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/webinar-prize-draw-terms-and-conditions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/free-trial</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/mssp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/isp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/betaterms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/legal/subprocessors</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/events</loc>
    </url>
<url>
        <loc>https://www.invicti.com/world-class-support</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/appsec-indicator-fall-2022-edition</loc>
    </url>
<url>
        <loc>https://www.invicti.com/mysql-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/pci-asv-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/soap-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/magento-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/graphql-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/wordpress-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison/invicti-vs-escape</loc>
    </url>
<url>
        <loc>https://www.invicti.com/drupal-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/manage-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/track-appsec-kpis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/automate-security-workflows</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/manage-open-source-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/platform-overview</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/application-security-posture-management-aspm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/aspm-cost-savings-calculator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/aspm-comparison/invicti-vs-codedx</loc>
    </url>
<url>
        <loc>https://www.invicti.com/aspm-comparison/invicti-vs-oxsecurity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/aspm-comparison/invicti-vs-armorcode</loc>
    </url>
<url>
        <loc>https://www.invicti.com/integrations</loc>
    </url>
<url>
        <loc>https://www.invicti.com/use-cases/xss-scanner-online</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/gartner-api-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/iac</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/secrets</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/cloud-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/attack-surface-management</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/agentic-penetration-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/product/threat-intelligence</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/latio-application-security-market-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/solutions/api-discovery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/msp-mssp-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-scanner-comparison</loc>
    </url>
<url>
        <loc>https://www.invicti.com/sql-injection-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/vulnerability-management</loc>
    </url>
<url>
        <loc>https://www.invicti.com/clp/agentic-pentesting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/use-cases/hipaa-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ahmet-kakici</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/aleksei-tiurin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/alex-baker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/alex-bender</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/alexa-rogers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/alexandra-schroeder</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ali-kose</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/allen-baird</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/alperen-orsdemir</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/alvaro-warden</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/amir-shahmiri</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/amit-chita</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/andreas-wiese</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/andrew-binstock</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/antoine-debono</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ariel-miller</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/aydin-kayacik</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/baris-ekin-yildirim</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ben-strozykowski</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/benjamin-daniel-mussler</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/benjamin-murray</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/bill-camarda</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/bogdan-calin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/brett-durlock</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/brian-eastwood</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/caitlin-smith</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/can-bilgin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/can-fil</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/cenk-kalpakoglu</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/charmaine-odums</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/chelsea-glosser</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/chris-lindsey</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/cihan-karatas</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/dan-murphy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/daniel-bishtawi</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/daniel-sauritch</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/david-strom</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/dawn-baird</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/dogan-aydos</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/don-shin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/emre-aladag</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/emre-yilmaz</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ericka-chickowski</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ersan-erkol</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ferruh-mavituna</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/frank-catucci</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/gokhan-demir</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/hakan-arici</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/huseyin-tufekcilerli</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/invicti-security-team</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/invicti-team</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/invictisecurityteam</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/invictiteam</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/irit-arkin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ivana-stastna</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/jesse-neubert</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/jiri-tuma</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/jodi-holzband</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/jonny-stewart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/julie-anderson</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/kadir-arslan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/karen-lynch</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/kate-bachman</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/kate-lau</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/kathy-foley</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/kellie-vugrincic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/kelly-davis-felner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ken-schirrmacher</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/kevin-beaver</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/kevin-gallagher</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/koray-agaya</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/laura-paine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/lindsey-margolis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/lindsey-stalnaker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/luis-pereira</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/mark-townsend</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/matthew-sciberras</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/meaghan-mcbee</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/mehmet-leblebici</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/melinda-marks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/mercedes-cardona</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/michael-george</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/mike-faden</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/mike-mattos</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/mithat-gogebakan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/molly-frampton</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/mustafa-yalcin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/neil-roseman</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/noel-slane</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/nur-yesilyurt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/oguz-kurumlu</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/oksana-pure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/omer-citak</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/onur-yilmaz</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ozgur-dinc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/patrick-vandenberg</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/paul-good</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/paul-nipper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/peterferrigan-peterferrigan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/piotr-sobolewski</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/priyank-savla</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/rob-barney</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/robert-abela</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ryan-bergquist</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ryan-dewhurst</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ryan-lynch</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/sambor-krasnodebski</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/samuel-greengard</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/saran-toure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/selcuk-miynat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/selman-genc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/seyhan-bakir</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/seyma-kara</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/sonali-shah</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/stephanie-overby</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/suha-akyuz</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/suphi-cankurt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/sven-morgenroth</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/test</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/tim-runestad</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/timur-guvenkaya</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/tomasz-andrzej-nidecki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/tomasz-nidecki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/tuncay-kayaoglu</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ugur-aldanmaz</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/umran-yildirimkaya</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/zbigniew-banach</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/author/ziyahan-albeniz</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/advanced-manual-scanning-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/advanced-website-crawling-technologies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/api-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/automate-remediation-workflows</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/automate-testing-and-remediation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/continuous-web-asset-discovery-engine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/dashboards-reporting-compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/detailed-scan-results</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/developer-guidance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/flexible-deployment-options</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/iast-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/industry-leading-accuracy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/integrate-security-development</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/manage-sboms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/out-of-band-detection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/predict-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/proof-based-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/simplify-compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/software-composition-analysis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/technology-version-tracking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/track-appsec-metrics</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/train-secure-development</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/unify-vulnerability-management</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/unlimited-role-based-access</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/vulnerability-trend-matrix</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/vulnerability-trend-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features/waf-integrations</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features-categories/assess-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features-categories/continuously-secure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features-categories/detect-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features-categories/discover-and-crawl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features-categories/integrate</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features-categories/manage-risk-posture</loc>
    </url>
<url>
        <loc>https://www.invicti.com/features-categories/resolve-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/severity/best-practice</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/severity/critical</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/severity/high</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/severity/information</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/severity/low</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/severity/medium</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/aah-go-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/abantecart-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/actionhero-js-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/active-mixed-content-over-https</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/activemq-remote-code-execution-cve-2023-46604</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/adminer-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/administration-page-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/adobe-commerce-magento-sessionreaper-rce-cve-2025-54236</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/aem-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ampache-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/an-unsafe-content-security-policy-csp-directive-in-use</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/angular-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/angularjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/anonymous-ciphers-supported</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-coyote-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-module-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-multiple-choices-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-multiviews-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-ofbiz-authentication-bypass-cve-2023-51467</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-ofbiz-log4shell-rce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-ofbiz-rce-cve-2024-32113-cve-2024-36104-cve-2024-38856</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-ofbiz-rce-cve-2024-45195</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-ofbiz-soapservice-deserialization-rce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-ofbiz-ssrf-cve-2023-50968</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-ofbiz-ssrf-cve-2024-45507</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-ofbiz-xmlrpc-deserialization-rce-cve-2020-9496-cve-2023-49070</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-server-info-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-server-status-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-shiro-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-struts-path-traversal-s2-067-cve-2024-53677-s2-066-cve-2023-50164</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-traffic-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apache-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/apples-app-site-association-aasa-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/arbitrary-file-creation-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/arbitrary-file-deletion-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/artifactory-devops-solution-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-cookieless-authentication-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-cookieless-session-state-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-customerrors-is-disabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-debugging-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-failure-to-require-ssl-for-authentication-cookies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-login-credentials-stored-in-plain-text</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-mvc-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-tracing-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-validaterequest-is-globally-disabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/asp-net-viewstateuserkey-is-not-set</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/aspnetsignalr-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/atlassian-confluence-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/atlassian-jira-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/atlassian-proxy-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/atutor-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/authentication-bypass-in-fortra-s-goanywhere-mft-cve-2024-0204</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/authentication-bypass-in-ivanti-connect-secure-and-policy-secure-cve-2023-46805</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/authorization-required</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/autocomplete-enabled-password-field</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/autocomplete-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/aws-dockerrun-configuration-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/awstats-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/axios-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/axis-development-mode-enabled-in-web-inf-server-config-wsdd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/axis-system-configuration-listing-enabled-in-web-inf-server-config-wsdd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/axway-secure-transport-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/axway-securetransport-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/b-r-e-a-c-h-attack-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/b2evolution-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/backbonejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/backup-file-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/backup-source-code-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/base-tag-hijacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bash-command-injection-vulnerability-shellshock-bug</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/basic-authorization-over-http</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/basic-authorization-required</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bitninja-captcha-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/blind-command-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/blind-cross-site-scripting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/blind-mongodb-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/blind-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bluebird-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bomgar-remote-support-software-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/boolean-based-mongodb-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/boolean-based-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bootbox-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bootstrap3datetimepicker-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bootstrapjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bootstrapselect-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bootstraptable-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bootstraptoggle-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/bootstraptypeahead-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/caddy-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cakephp-framework-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/canvasjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-airee</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-akamai</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-arvan-cloud</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-azure-cdn</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-cdn77</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-fastly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-fireblade</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-google-cloud-cdn</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-incapsula</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-instart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-jsdelivr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-keycdn</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-maxcdn</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-netlify</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-powercdn</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-qrator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-stackpath</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-sucuri</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdn-detected-west263</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cdnjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/certificate-is-signed-using-a-weak-signature-algorithm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/chamilo-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/chartjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cherokee-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cherrypy-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/citrix-netscaler-adc-gateway-xss-cve-2025-12101</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/citrix-netscaler-memory-disclosure-citrix-bleed-2-cve-2025-5777</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ckeditor-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/claroline-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/clipbucket-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cloudflare-bot-management</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cloudflare-browser-insights</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cloudflare-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-apache-struts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-apache-struts-s02-53</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-apache-struts-s2-016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-apache-struts-s2-045</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-apache-struts-s2-046</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-asp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-node-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-perl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-php-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-python</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-ror</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-ror-json</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-ruby</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-evaluation-via-local-file-inclusion-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-file-upload</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-local-file-inclusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-asp-net-razor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-java-freemarker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-java-pebble</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-java-velocity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-jinjava</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-node-js-dot</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-node-js-ejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-node-js-marko</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-node-js-nunjucks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-node-js-pug-jade</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-php-smarty</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-php-twig</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-python-jinja</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-python-mako</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-python-tornado</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-ruby-erb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-ssti-ruby-slim</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/code-execution-via-webdav</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/collabtive-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/command-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/command-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/concrete5-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/configuration-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/contao-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-csp-contains-out-of-scope-report-uri-domain</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-csp-keywords-not-used-within-single-quotes</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-csp-nonce-value-not-used-within-single-quotes</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-csp-nonce-without-matching-script-block</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-csp-not-implemented</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-csp-report-uri-uses-http</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-report-only-cannot-be-declared-between-meta-tags</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/content-security-policy-report-only-cannot-be-declared-without-report-uri-directive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cookie-not-marked-as-httponly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cookie-not-marked-as-secure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cookie-values-used-in-anti-csrf-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cookieconsent2-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/coppermine-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cowboy-http-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/craft-cms-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/credit-card-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/critical-form-send-to-http</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/critical-form-served-over-http</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-referrer-leakage-through-usage-of-no-referrer-when-downgrade-in-referrer-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-referrer-leakage-through-usage-of-origin-when-cross-origin-in-referrer-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-referrer-leakage-through-usage-of-strict-origin-in-referrer-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-referrer-leakage-through-usage-of-strict-origin-when-cross-origin-in-referrer-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-referrer-leakage-through-usage-of-the-origin-keyword-in-referrer-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-referrer-leakage-through-usage-of-unsafe-url-in-referrer-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-request-forgery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-request-forgery-in-login-form</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-scripting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-scripting-dom-based</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-scripting-via-file-upload</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cross-site-scripting-via-remote-file-inclusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/crossdomain-xml-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/crushftp-server-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cubecart-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/custom-error-pages-are-not-configured-in-web-inf-web-xml</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cve-2024-6297-wordpress-plugin-backdoor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cvs-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/cyberpanel-rce-cve-2024-51567-cve-2024-51568-cve-2024-51378</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/d3js-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/daiquiri-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/data-used-in-a-content-security-policy-csp-directive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-connection-string-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-detected-hsqldb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-detected-microsoft-access</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-detected-microsoft-sql-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-detected-mongodb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-detected-mysql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-detected-oracle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-detected-postgresql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-detected-sqlite</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-error-message-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-name-disclosure-microsoft-sql-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-name-disclosure-mysql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/database-user-has-admin-privileges</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/datadome-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/datatables-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dbninja-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-apache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-cakephp-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-iis-10-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-iis-6</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-iis-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-iis-7-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-iis-7-x</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-iis-8</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-iis-8-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-page-detected-tomcat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/default-src-used-in-content-security-policy-csp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/denial-of-service-mysql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/deprecated-header-instruction-used-to-implement-content-security-policy-csp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/digest-authorization-required</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/directory-listing-apache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/directory-listing-asp-net-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/directory-listing-iis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/directory-listing-lighttpd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/directory-listing-litespeed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/directory-listing-nginx</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/directory-listing-tomcat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/directory-listing-webdav</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/disabled-x-xss-protection-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/django-debug-mode-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/django-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/docker-cloud-stack-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/docker-compose-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dockerfile-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dockerignore-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dojo-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dokuwiki-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dolibarr-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dolphin-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dompurify-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dotclear-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dotcms-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/drupal-core-remote-code-execution-cve-2019-6340</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/drupal-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ds-store-file-found</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/dwr-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/e107-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/easyxdm-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/efjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/elgg-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/elmah-axd-errorlog-axd-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/email-address-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ember-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/error-based-mongodb-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/espocrm-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/exception-report-disclosure-tomcat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/expect-ct-header-via-http</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/expect-ct-in-report-only-mode</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/expect-ct-not-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/expect-ct-security-header-errors-and-warnings</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/expired-ssl-certificate</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/express-development-mode-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/express-express-session-weak-secret-key-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/expression-language-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/expressjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/extjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ezproxy-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/f5-big-ip-local-file-inclusion-cve-2020-5902</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/fabricjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/family-connections-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/fancybox-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/file-upload-functionality-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/fingerprintjs2-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/flickity-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/fluxbb-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/footablejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/forbidden-resource</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/form-hijacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/form-tools-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/fortigate-ssl-vpn-arbitrary-file-reading-cve-2018-13379</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/fortiweb-authentication-bypass-cve-2025-64446</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/foundation-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/frame-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/front-accounting-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/frontpage-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/fuelux-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/generic-email-address-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/geoserver-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/gibbonedu-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/git-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/glassfish-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/google-tag-manager-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/grafana-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/grafana-open-redirect-cve-2025-4123</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphiql-explorer-playground-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-alias-overloading-allowed-potential-denial-of-service-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-array-based-query-batching-allowed-potential-batching-attack-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-circular-query-via-introspection-allowed-potential-dos-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-endpoint-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-field-suggestions-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-introspection-query-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-apollo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-ariadne</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-dgraph</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-diana-jl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-directus</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-gqlgen</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-graphene</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-graphql-api-for-wordpress</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-graphql-go</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-graphql-java</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-graphql-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-hasura</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-hot-chocolate</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-juniper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-ruby-graphql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-sangria</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-tartiflette</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-library-detected-wpgraphql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-non-json-mutations-over-get-potential-csrf-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-non-json-queries-over-get-potential-csrf-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-non-json-queries-over-post-potential-csrf-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-unauthenticated-mutation-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/graphql-unhandled-error-leakage</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/gsap-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/gunicorn-python-wsgi-http-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/hammerjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/handlebarsjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/hesk-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/hiawatha-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/highcharts-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/htaccess-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/html5shiv-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/http-header-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/http-header-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/http-parameter-pollution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/http-strict-transport-security-hsts-errors-and-warnings</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/http-strict-transport-security-hsts-max-age-value-too-low</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/http-strict-transport-security-hsts-policy-not-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/http-strict-transport-security-hsts-via-http</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/hubspot-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/i-m-a-teapot</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ibm-business-process-manager-bpm-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ibm-http-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ibm-rational-team-concert-rtc-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ibm-security-access-manager-webseal-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/iis-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/imagepicker-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/incorrect-content-security-policy-csp-implementation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/inferno-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/information-disclosure-microsoft-office</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-frame-external</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-http-usage</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-jsonp-endpoint</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-protocol-detected-in-content-security-policy-csp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-reflected-content</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-transportation-security-protocol-supported-sslv2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-transportation-security-protocol-supported-sslv3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-transportation-security-protocol-supported-tls-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-transportation-security-protocol-supported-tls-1-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/insecure-usage-of-version-1-guid</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/installation-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/intermediate-certificate-is-signed-using-a-weak-signature-algorithm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/internal-ip-address-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/internal-path-disclosure-nix</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/internal-path-disclosure-windows</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/internal-server-error</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/introjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/invalid-content-security-policy-csp-directive-identified-in-meta-elements</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/invalid-ssl-certificate</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ionrangeslider-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ivanti-ics-and-ips-command-injection-cve-2024-21887</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/java-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/java-servlet-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/java-verb-tampering-via-misconfigured-security-constraint</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/javamelody-interface-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/javascriptcookie-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jboss-application-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jboss-core-services-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jboss-enterprise-application-platform-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jboss-web-console-jmx-invoker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jenkins-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jetbrains-idea-project-directory-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jetty-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jolokia-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/joomla-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jplayer-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jquery-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jquery-placeholder-js-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jquerymask-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jquerymigrate-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jquerymobile-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jqueryuiautocomplete-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jqueryuidialog-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jqueryuitooltip-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jqueryvalidation-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/json-web-key-set-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jsp-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jstree-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jszip-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jwt-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jwt-forgery-via-chaining-jku-parameter-with-open-redirect</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jwt-forgery-via-path-traversal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jwt-forgery-via-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jwt-forgery-via-unvalidated-jku-parameter</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jwt-kid-parameter-out-of-band-command-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jwt-signature-bypass-via-none-algorithm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/jwt-signature-is-not-verified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/kestrel-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/knockoutjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/knockoutmapping-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/kong-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/laravel-debug-mode-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/laravel-environment-configuration-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/lazyjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ldap-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/leaflet-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/liferay-digital-experience-platform-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/liferay-portal-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/lightbox-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/lighthouse-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/lighttpd-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/limesurvey-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/listjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/litespeed-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/local-file-inclusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/local-file-inclusion-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/lodash-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/log-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/login-page-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/lua-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/magento-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mail-header-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mailman-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/malware-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/marionettejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/markdown-it-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/masa-cms-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mashery-proxy-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mathjax-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mathjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mediawiki-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mibew-messenger-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/microsoft-access-database-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/microsoft-iis-log-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/microsoft-outlook-personal-folders-file-pst-found</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mint-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/misconfigured-access-control-allow-origin-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/misconfigured-frame</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/misconfigured-x-frame-options-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/missing-frame-ancestors-in-csp-declaration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/missing-object-src-in-csp-declaration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/missing-x-content-type-options-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/missing-x-frame-options-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/missing-x-xss-protection-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mithril-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mod-ssl-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/modernizr-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/modx-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/momentjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mongodb-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mongodb-operator-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mongrel-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/moodle-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/movable-type-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/moveit-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/multiple-content-security-policy-csp-implementation-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/multiple-declarations-in-x-frame-options-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mustachejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/mybb-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/next-js-react-framework-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/next-js-react-server-components-rce-cve-2025-55182-cve-2025-66478</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/nexus-repository-oss-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/nginx-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/no-saml-response-signature-check</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/no-script-block-detected-with-the-hash-value-declared-in-content-security-policy-csp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/node-js-web-application-does-not-handle-uncaughtexception</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/node-js-web-application-does-not-handle-unhandledrejection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/nonce-usage-detected-in-content-security-policy-csp-directive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ntlm-authorization-required</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/nusoap-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/omeka-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/open-policy-crossdomain-xml-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/open-redirection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/open-redirection-dom-based</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/open-redirection-in-post-method</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/open-silverlight-client-access-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/opencart-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/openresty-web-platform-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/opensearch-xml-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/openssl-heartbleed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/openssl-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/openvpn-access-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/options-method-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/oracle-access-manager-opensso-deserialization-rce-cve-2021-35587</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/oracle-application-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/oracle-ebs-unauthenticated-remote-code-execution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/oracle-http-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/oracle-identity-manager-authentication-bypass-cve-2025-61757</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/oracle-weblogic-authentication-bypass-cve-2020-14883</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/oracle-weblogic-remote-code-execution-cve-2020-14882</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/osclass-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/oscommerce-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/osticket-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-apache-struts-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-apache-struts-2-s2-053</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-asp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-log4j</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-node-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-perl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-python</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-ror</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-ror-json</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-evaluation-ruby</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-java-freemarker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-java-velocity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-node-js-dot</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-node-js-ejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-node-js-marko</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-node-js-nunjucks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-node-js-pug-jade</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-php-smarty</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-php-twig</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-python-jinja</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-python-mako</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-code-execution-via-ssti-python-tornado</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-command-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-remote-file-inclusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-saml-consumer-service-xml-entity-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-saml-consumer-service-xslt-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-band-xml-external-entity-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-asp-net-mvc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-bootstrap-select</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-bootstrap-table</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-bootstrap-typeahead</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-component-applicationname</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-frontpage</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-jquery-placeholder-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-mongrel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-oracle-application-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-phusion-passenger</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-sharepoint</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-taleo-web-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-varnish</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-abantecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ampache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-angular</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-angularjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-apache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-apache-coyote</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-apache-traffic-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-artifactory-devops-solution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-asp-net-signalr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-atlassian-confluence</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-atlassian-jira</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-atlassian-proxy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-atutor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-axios</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-axway-securetransport-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-b2evolution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-backbone-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-bluebird</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-bootbox-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-bootstrap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-bootstrap-3-date-time-picker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-bootstrap-toggle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-cakephp-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-canvasjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-chamilo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-chart-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-cherokee</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-cherrypy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ckeditor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-claroline</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-clipbucket</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-collabtive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-concerte5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-contao</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-cookieconsent2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-coppermine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-cowboy-http-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-cubecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-d3-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-daiquiri</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-datatables</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-django</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-dojo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-dokuwiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-dolibarr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-dolphin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-dompurify</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-dotclear</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-dotcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-drupal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-dwr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-e107</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-easyxdm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ef-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-elgg</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ember-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-espocrm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ext-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-fabric-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-family-connections</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-fancybox</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-fingerprintjs2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-flickity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-fluxbb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-footable</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-form-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-foundation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-front-accounting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-fuel-ux</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-geoserver</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-gibbonedu</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-glassfish</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-google-charts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-grafana</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-gsap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-gunicorn-python-wsgi-http-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-hammer-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-handlebars-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-hesk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-hiawatha</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-highcharts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-hsqldb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-html5-shiv</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ibm-http-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ibm-rational-team-concert-rtc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ibm-security-access-manager-webseal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-iis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-imagepicker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-inferno</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-intro-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ion-rangeslider</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-it-hit-webdav-server-net</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-java</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-java-servlet</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-javascript-cookie</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jboss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jenkins</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jetty-web-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jolokia</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-joomla</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jplayer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jquery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jquery-mask</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jquery-migrate</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jquery-mobile</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jquery-ui-autocomplete</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jquery-ui-dialog</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jquery-ui-tooltip</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jquery-validation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jsp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jstree</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-jszip</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-knockout</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-knockout-mapping</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-kong</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-lazy-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-leaflet</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-liferay-digital-experience-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-liferay-portal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-lightbox</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-lighttpd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-limesurvey</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-list-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-lodash</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-lua</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-magento</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mailman</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-marionette-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-markdown-it</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-masa-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-math-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mathjax</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mediawiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mibew-messenger</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-microsoft-sql-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mithril</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mod-ssl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-modernizr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-modx</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-moment-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mongodb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-moodle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-movable-type</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-moveit-transfer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ms-exchange</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mustache-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mybb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-mysql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-next-js-react-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-nexus-repository-oss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-nginx</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-nusoap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-omeka</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-opencart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-openresty</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-openssl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-oracle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-osclass</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-oscommerce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-osticket</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-owncloud</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-payara</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-pdf-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-pega</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-perl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ph7cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-phaser</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-phorum</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-php-address-book</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-phpbb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-phpfusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-phplist</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-phpmyadmin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-phpmyfaq</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-piwigo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-pixi-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-plone-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-plupload</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-pmwiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-podcast-generator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-polymer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-popper-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-postgresql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-prestashop</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-prettyphoto</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-projectsend</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-prototype-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-python</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-python-wsgiserver</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-qdpm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-question2answer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ramda</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-react</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-requirejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-resin-application-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-respond-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-restlet-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-reveal-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-revive-adserver</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-rickshaw</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-riot-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ror</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-roundcube</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-ruby</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-rubygems</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-rukovoditel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-scrollreveal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-select2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-semantic-ui</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-seopanel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-serendipity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-silverstripe-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-slick</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-snap-svg</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-sortable</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-sqlite</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-squid</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-sugarcrm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-swagger-ui</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-sweetalert2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-tcexam</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-telerik-web-ui</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-three-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-tinymce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-tomcat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-tornado-web-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-trac-software-project-management-tool</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-tracy-debugging-tool</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-twistedweb-http-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-typeahead-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-typo3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-uaparser-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-underscore-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-undertow-web-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-vanilla-forums</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-video-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-vtiger</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-vue-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-w3-total-cache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-weberp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-webid</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-weblogic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-werkzeug-python-wsgi-library</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-wordpress</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-xoops</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-xregexp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-xwiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-yetiforce-crm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-yourls</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-yui</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-zen-cart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-zenphoto</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-zepto-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-zikula</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-zope</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/out-of-date-version-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/overly-long-session-timeout</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/owncloud-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/palo-alto-pan-os-management-interface-auth-bypass-cve-2024-0012-cve-2024-9474</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/pan-os-globalprotect-xss-cve-2025-0133</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/pan-os-management-interface-authentication-bypass-cve-2025-0108</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/pardot-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/passive-mixed-content-over-https</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/passive-web-backdoor-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/password-transmitted-over-http</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/password-transmitted-over-query-string</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/payara-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/pdfjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/pega-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/perl-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ph7cms-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phaser-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phishing-by-navigating-browser-tabs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phorum-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-address-book-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-allow-url-fopen-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-allow-url-include-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-display-errors-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-enable-dl-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-magic-quotes-gpc-is-disabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-open-basedir-is-not-configured</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-register-globals-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-session-use-only-cookies-is-disabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/php-session-use-trans-sid-is-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phpbb-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phpfusion-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phpinfo-output-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phplist-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phpliteadmin-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phpmoadmin-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phpmyadmin-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phpmyfaq-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/phusion-passenger-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/piwigo-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/piwik-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/pixijs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/play-web-framework-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/plesk-linux-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/plesk-windows-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/plone-cms-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/plupload-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/pmwiki-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/podcast-generator-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/polyfill-io-supply-chain-attack</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/polymer-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/popper-js-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/possible-boolean-mongo-db-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/possibleblindmongodb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/prestashop-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/prettyphoto-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/private-burp-collaborator-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/private-json-web-key-set-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/programming-error-message</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/programming-error-message-ruby</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/progress-moveit-transfer-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/projectsend-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/prototype-pollution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/prototypejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/python-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/python-wsgiserver-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/qdpm-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/question2answer-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ramda-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/react-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/readme-help-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/referrer-policy-needs-proper-fallback</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/referrer-policy-not-implemented</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/reflected-file-download</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/regresshion-attack-cve-2024-6387</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/remote-code-execution-and-dos-in-http-sys-iis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/remote-code-execution-spring4shell</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/remote-file-inclusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/requirejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/resin-application-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/respondjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/restlet-framework-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/retired-hash-function-in-saml-response</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/revealjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/reverse-proxy-detected-apache-traffic-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/reverse-proxy-detected-citrix-netscaler</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/reverse-proxy-detected-envoy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/reverse-proxy-detected-f5-big-ip</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/reverse-proxy-detected-haproxy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/reverse-proxy-detected-skipper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/revive-adserver-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/revoked-ssl-certificate</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/rickshaw-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/riotjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/robot-attack-detected-strong-oracle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/robot-attack-detected-weak-oracle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/robots-txt-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ror-database-configuration-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ror-development-mode-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/roundcube-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/rsa-private-key-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ruby-on-rails-file-content-disclosure-cve-2019-5418</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ruby-on-rails-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/rubygems-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/rukovoditel-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sailsjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/samesite-cookie-not-implemented</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/samesite-none-cookie-not-marked-as-secure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/saml-consumer-service-keyinfo-retrievalmethod-ssrf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/saml-consumer-service-xss-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/saml-response-signature-exclusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/saml-response-without-signature</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/scheme-uri-detected-in-content-security-policy-csp-directive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/scrollreveal-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/security-txt-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/select2-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/semanticui-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-amazon-aws-access-key-id</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-amazon-aws-secret-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-amazon-mws-auth-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-amazon-ses-smtp-password</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-consul-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-database-connection-string-mongodb-mysql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-database-connection-string-postgresql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-devise-secret-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-facebook-access-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-facebook-app-id</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-facebook-app-secret</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-gitlab-personal-access-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-google-cloud-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-google-oauth-access-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-heroku-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-jdbc-database-connection-string</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-jenkins-secret</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-linkedin-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-mailchimp-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-mailgun-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-mapbox-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-nexmo-secret</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-npm-access-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-nuget-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-okta-secret-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-omise-secret-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-paypal-access-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-picatic-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-sendgrid-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-sentry-auth-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-slack-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-slack-v1-x-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-slack-webhook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-sonarqube-user-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-square-oauth-secret</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-square-personal-access-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-ssh-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-stripe-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-symfony-application-secret</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-teams-webhook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-telegram-bot-api-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-twilio-api-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-twitter-access-token-secret</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-twitter-api-secret-key</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-data-exposure-wordpress-authentication-key-salt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sensitive-pages-could-be-cached</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/seopanel-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/serendipity-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-apache-server-status</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-aws</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-elmah</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-elmah-mvc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-equinix</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-mysql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-oracle-cloud</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-packet-cloud</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-ssh</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-time-based</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-request-forgery-trace-axd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-asp-net-razor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-java-freemarker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-java-pebble</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-java-velocity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-jinjava</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-node-js-dot</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-node-js-ejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/server-side-template-injection-ruby-erb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/session-cookie-not-marked-as-secure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sharepoint-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sharepoint-toolshell-rce-cve-2025-49704-cve-2025-49706-cve-2025-53770-cve-2025-53771</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/shell-script-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/shopify-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/silverlight-client-access-policy-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/silverstripe-cms-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/simplehelp-path-traversal-cve-2024-57727</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sitecore-arbitrary-file-read-cve-2024-46938</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sitecore-xm-xp-insecure-deserialization-cve-2025-27218</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sitemap-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/slick-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/snapsvg-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/social-security-number-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sonicwall-ssl-vpn-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sortablejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-asp-net</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-coldfusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-generic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-java</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-java-servlet</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-jsp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-perl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-python</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-ruby</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/source-code-disclosure-tomcat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-actuator-endpoint-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-actuator-endpoint-security-disabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-admin-mbean-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-all-spring-boot-actuator-endpoints-are-web-exposed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-datasource-credentials-stored-in-the-properties-file</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-developer-tools-enabled-on-production</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-h2-console-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-mongodb-credentials-stored-in-the-properties-file</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-overly-long-session-timeout</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-spring-boot-actuator-shutdown-endpoint-is-web-exposed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-boot-misconfiguration-unsafe-value-for-session-tracking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-framework-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/spring-misconfiguration-html-escaping-disabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sql-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sql-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sqlite-database-file-found</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/squarespace-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/squid-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ssl-certificate-is-about-to-expire</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ssl-certificate-name-hostname-mismatch</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ssl-tls-not-implemented</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ssl-untrusted-root-certificate</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-apache-myfaces</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-apache-shiro</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-asp-net</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-cakephp-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-cherrypy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-coldfusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-django</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-grails</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-graphql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-java</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-laravel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-node-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-python</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-ror</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stack-trace-disclosure-ruby-sinatra-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/static-nonce-identified-in-content-security-policy-csp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/stored-cross-site-scripting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/struts-2-config-browser-plugin-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/struts-2-development-mode-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/struts2-development-mode-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sublime-sftp-config-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/subresource-integrity-sri-hash-invalid</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/subresource-integrity-sri-not-implemented</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sugar-crm-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/svn-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/swagger-json-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/swaggerui-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/sweetalert2-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/tableau-server-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/taleo-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/tcexam-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/telerik-web-ui-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/test-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/text4shell-remote-code-execution-cve-2022-42889</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/threejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/tinymce-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/tls-ssl-certificate-key-size-too-small</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/tomcat-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/torchserve-management-api-publicly-exposed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/torchserve-management-api-ssrf-cve-2023-43654</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/tornado-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/trac-software-project-management-tool-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/trace-axd-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/trace-track-method-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/tracy-debugging-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/travis-ci-configuration-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ts-web-access-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/twistedweb-http-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/typeaheadjs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/typo3-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/uaparser-js-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unc-server-and-share-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unchecked-graphql-query-length-potential-denial-of-service-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/underscorejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/undertow-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unexpected-redirect-response-body-too-large</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unexpected-redirect-response-body-two-responses</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unicode-transformation-best-fit-mapping</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unknown-option-used-in-referrer-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unrestricted-file-upload</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unsafe-value-for-session-tracking-in-web-inf-web-xml</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/unsupported-hash-detected-in-content-security-policy-csp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/user-controllable-cookie</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/username-disclosure-microsoft-sql-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/username-disclosure-mysql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/vanilla-forums-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/varnish-http-cache-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/vegur-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-abantecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ampache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-angular</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-angularjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-apache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-apache-coyote</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-apache-module</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-apache-traffic-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-artifactory-devops-solution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-asp-net</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-asp-net-mvc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-aspnetsignalr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-atlassian-confluence</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-atlassian-jira</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-atlassian-proxy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-atutor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-axios</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-axway-securetransport-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-b2evolution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-backbonejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-bluebird</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-bootbox</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-bootstrap3datetimepicker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-bootstrapjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-bootstrapselect</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-bootstraptable</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-bootstraptoggle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-bootstraptypeahead</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-cakephp-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-canvasjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-chamilo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-chartjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-cherokee</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-cherrypy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ckeditor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-claroline</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-clipbucket</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-collabtive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-concrete5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-contao</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-cookieconsent2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-coppermine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-cowboy-http-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-cubecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-d3js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-daiquiri</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-datatables</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-django</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-dojo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-dolibarr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-dolphin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-dompurify</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-dotclear</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-dotcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-drupal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-dwr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-e107</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-easyxdm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-efjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-elgg</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ember</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-espocrm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-extjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-fabricjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-familyconnections</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-fancybox</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-fingerprintjs2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-flickity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-fluxbb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-footablejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-formtools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-foundation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-frontaccounting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-frontpage</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-fuelux</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-geoserver</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-gibbonedu</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-glassfish</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-grafana</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-gsap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-gunicorn-python-wsgi-http-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-hammerjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-handlebarsjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-hesk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-hiawatha</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-highcharts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-html5shiv</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ibm-http-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ibm-rational-team-concert-rtc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ibm-security-access-manager-webseal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-iis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-imagepicker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-inferno</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-introjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ionrangeslider</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-it-hit-webdav-server-net</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-java</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-java-servlet</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-javascriptcookie</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jboss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jenkins</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jetty</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jolokia</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-joomla</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jplayer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jquery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jquery-placeholder-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jquerymask</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jquerymigrate</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jquerymobile</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jqueryuiautocomplete</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jqueryuidialog</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jqueryuitooltip</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jqueryvalidation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jsp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jstree</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-jszip</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-knockoutjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-knockoutmapping</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-kong</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-lazyjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-leaflet</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-liferay-digital-experience-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-liferay-portal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-lightbox</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-lighttpd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-limesurvey</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-listjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-lodash</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-lua</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-magento</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mailman</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-marionettejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-markdown-it</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-masa-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mathjax</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mathjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mediawiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mibewmessenger</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mithril</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mod-ssl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-modernizr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-modx</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-momentjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mongrel-web-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-moodle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-movabletype</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-moveit-transfer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ms-exchange</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mustachejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-mybb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-next-js-react-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-nexus-repository-oss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-nginx</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-nusoap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-omeka</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-opencart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-openresty</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-openssl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-oracle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-osclass</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-oscommerce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-osticket</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-owncloud</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-payara</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-pdfjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-pega</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-perl</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ph7cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phaser</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phorum</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phpaddressbook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phpbb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phpfusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phplist</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phpmyadmin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phpmyfaq</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-phusion-passenger</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-piwigo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-pixijs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-plone-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-plupload</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-pmwiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-podcastgenerator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-polymer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-popper-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-prestashop</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-prettyphoto</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-projectsend</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-prototypejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-python</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-python-wsgiserver</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-qdpm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-question2answer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ramda</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-react</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-requirejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-resin-application-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-respondjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-restlet-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-revealjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-reviveadserver</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-rickshaw</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-riotjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ror</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-roundcube</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-ruby</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-rubygems</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-rukovoditel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-scrollreveal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-select2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-semanticui</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-seopanel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-serendipity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-sharepoint</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-silverstripe-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-slick</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-snapsvg</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-sortablejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-squid</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-sugar-crm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-swaggerui</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-sweetalert2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-taleo-web-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-tcexam</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-telerik-web-ui</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-threejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-tinymce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-tomcat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-tornado</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-trac-software-project-management-tool</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-tracy-debugging-tool</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-twistedweb-http-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-typeaheadjs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-typo3cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-uaparser-js</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-underscorejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-undertow-web-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-vanillaforums</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-varnish</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-videojs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-vuejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-w3-total-cache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-weberp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-webid</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-weblogic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-webrick</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-werkzeug-python-wsgi-library</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-wordpress</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-xoops</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-xregexp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-xwiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-yetiforcecrm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-yourls</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-yui</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-zencart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-zenphoto</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-zeptojs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-zikula</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/version-disclosure-zope</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/videojs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/viewstate-is-not-encrypted</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/viewstate-mac-disabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/vite-arbitrary-file-read-cve-2025-30208-cve-2025-31125</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/vmware-aria-operations-for-networks-remote-code-execution-cve-2023-20887</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/vtiger-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/vuejs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/w3-total-cache-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/weak-basic-authentication-credentials</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/weak-ciphers-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/weak-frame-ancestors-detected-in-content-security-policy-csp-declaration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/weak-nonce-detected-in-content-security-policy-csp-declaration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/weak-secret-is-used-to-sign-jwt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/web-application-firewall-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/web-backdoor-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/web-cache-deception</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/web-config-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/webalizer-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/webdav-directory-has-write-permissions-iis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/webdav-enabled</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/weberp-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/webid-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/weblogic-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/werkzeug-python-wsgi-library-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/whoops-error-handler-framework-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wildcard-detected-in-domain-portion-of-content-security-policy-csp-directive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wildcard-detected-in-port-portion-of-content-security-policy-csp-directive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wildcard-detected-in-scheme-portion-of-content-security-policy-csp-directive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wildfly-application-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/windows-azure-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/windows-ce-os-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/windows-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/windows-short-filename</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/windows-username-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wing-ftp-anonymous-access</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wing-ftp-server-rce-cve-2025-47812</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-configuration-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-advanced-custom-fields-extended-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-advanced-custom-fields-extended-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-advanced-custom-fields-extended-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-akismet-spam-protection-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-akismet-spam-protection-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-akismet-spam-protector-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-all-in-one-wp-migration-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-all-in-one-wp-migration-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-all-in-one-wp-migration-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-backup-migration-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-backup-migration-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-backup-migration-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-classic-editor-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-classic-editor-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-classic-editor-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-contact-form-7-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-contact-form-7-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-contact-form-7-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-contact-form-by-wpforms-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-contact-form-by-wpforms-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-contact-form-by-wpforms-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-elementor-website-builder-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-elementor-website-builder-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-elementor-website-builder-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-jetpack-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-jetpack-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-jetpack-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-jupiter-x-core-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-jupiter-x-core-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-jupiter-x-core-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-litespeed-cache-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-litespeed-cache-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-litespeed-cache-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-login-with-phone-number-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-login-with-phone-number-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-login-with-phone-number-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-really-simple-ssl-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-really-simple-ssl-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-really-simple-ssl-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-smash-balloon-social-photo-feed-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-smash-balloon-social-photo-feed-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-smash-balloon-social-photo-feed-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-ultimate-member-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-ultimate-member-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-ultimate-member-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-updraft-plus-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-updraft-plus-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-updraftplus-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-woocommerce-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-woocommerce-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-woocommerce-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-wordfence-security-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-wordfence-security-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-wordfence-security-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-wordpress-importer-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-wordpress-importer-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-wordpress-importer-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-yoast-duplicate-post-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-yoast-duplicate-post-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-yoast-duplicate-post-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-yoast-seo-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-yoast-seo-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-plugin-yoast-seo-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-setup-configuration-file</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-alishop-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-alishop-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-alishop-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-astra-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-astra-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-astra-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-avesa-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-avesa-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-avesa-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-bosmarket-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-bosmarket-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-bosmarket-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-floris-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-floris-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-floris-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-furniki-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-furniki-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-furniki-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-gaion-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-gaion-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-gaion-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-generate-press-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-generatepress-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-generatepress-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-go-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-go-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-go-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-grshop-grocery-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-grshop-grocery-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-grshop-grocery-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-hello-elementor-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-hello-elementor-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-hello-elementor-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-histore-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-histore-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-histore-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-homevillas-real-estate-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-homevillas-real-estate-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-homevillas-real-estate-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-houskit-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-houskit-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-houskit-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-imarket-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-imarket-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-imarket-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-inspiro-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-inspiro-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-inspiro-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-jobcareer-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-jobcareer-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-jobcareer-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-kadence-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-kadence-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-kadence-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-konstore-shop-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-konstore-shop-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-konstore-shop-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-levogue-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-levogue-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-levogue-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-neomarket-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-neomarket-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-neomarket-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-nicemerry-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-nicemerry-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-nicemerry-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-nusai-fashion-store-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-nusai-fashion-store-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-nusai-fashion-store-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-oceanwp-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-oceanwp-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-oceanwp-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-popularfx-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-popularfx-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-popularfx-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-rozy-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-rozy-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-rozy-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-secretsho-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-secretsho-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-secretsho-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-sedona-shop-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-sedona-shop-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-sedona-shop-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-shop4u-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-shop4u-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-shop4u-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-shopymall-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-shopymall-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-shopymall-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-siezz-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-siezz-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-siezz-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-soaz-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-soaz-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-soaz-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-storemate-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-storemate-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-storemate-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-nineteen-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-nineteen-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-nineteen-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-seventeen-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-seventeen-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-seventeen-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-sixteen-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-sixteen-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-sixteen-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-one-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-one-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-one-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-three-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-three-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-three-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-two-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-two-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-two-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-twenty-twenty-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-yith-wonder-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-yith-wonder-out-of-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wordpress-theme-yith-wonder-version-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wp-admin-page-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/wp-engine-configuration-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ws-ftp-log-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/xml-external-entity-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/xml-external-entity-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/xoops-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/xpath-injection-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/xregexp-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/xwiki-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/yetiforce-crm-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/yourls-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/yui-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/zen-cart-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/zenphoto-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/zeptojs-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/zikula-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/zope-web-server-identified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/zsh-history-file-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/zurmo-detected</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/115</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/164-308-a</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/937</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/av-n-ac-l-au-n-c-n-i-n-a-p</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/av-n-ac-l-au-n-c-p-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/av-n-ac-l-au-n-c-p-i-p-a-p</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/av-n-ac-m-au-n-c-c-i-c-a-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/av-n-ac-m-au-n-c-n-i-p-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/av-n-ac-m-au-n-c-p-i-p-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-102</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-103</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-105</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-107</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-114</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-117</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-117-319ce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-118</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-127</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-16</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-17</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-17-7aab7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-170</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-180</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-19</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-193</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-210</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-212</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-214</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-216</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-217</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-224</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-23</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-242</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-251</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-252</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-26</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-310</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-340</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-346</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-346-bf0db</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-347</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-356</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-37</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-375</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-376</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-443</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-459</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-62</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-65</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-66</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-87</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-88</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/capec-capec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-a-ac-h-pr-n-ui-n-s-u-c-h-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-a-ac-h-pr-n-ui-n-s-u-c-h-i-h-a-n-8baf2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-a-ac-h-pr-n-ui-n-s-u-c-h-i-h-a-n-e-p-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-a-ac-h-pr-n-ui-n-s-u-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-a-ac-l-pr-n-ui-n-s-u-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-a-ac-l-pr-n-ui-r-s-u-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-l-ui-n-s-c-c-l-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-l-ui-r-s-u-c-h-i-h-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-c-c-h-i-h-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-c-c-h-i-h-a-h-e-p-rl-w-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-c-c-h-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-c-c-h-i-l-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-c-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-c-c-l-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-u-c-h-i-h-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-u-c-h-i-h-a-h-e-h-rl-o-cr-h-ir-h-ar-h-mav-n-mpr-n-mui-n-ms-u-mc-n-mi-n-ma-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-u-c-h-i-h-a-l</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-u-c-h-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-h-pr-n-ui-n-s-u-c-n-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-h-ui-n-s-c-c-h-i-h-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-h-ui-n-s-u-c-h-i-h-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-l-ui-n-s-c-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-l-ui-n-s-u-c-l-i-n-a-n-e-h-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-h-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-h-a-h-e-h-rl-o</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-h-a-h-e-h-rl-w-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-h-a-h-e-p-rl-w-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-h-a-h-rl-o</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-n-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-h-i-n-a-n-rl-o</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-l-i-h-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-l-i-l-a-l</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-l-i-l-a-l-e-h-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-l-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-n-i-l-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-n-i-n-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-c-c-n-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-h-i-h-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-h-i-h-a-h-e-h-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-h-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-h-i-l-a-l</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-h-i-l-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-h-i-n-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-h-i-n-a-n-e-h-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-l-i-l-a-l</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-l-i-l-a-l-e-h-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-l-i-l-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-l-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-l-i-n-a-n-e-h-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-n-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-n-i-h-a-n-e-h-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-n-i-l-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-n-i-n-a-h</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-n-s-u-c-n-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-r-s-c-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-r-s-c-c-l-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-r-s-u-c-h-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-r-s-u-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-r-s-u-c-h-i-n-a-n-e-h-rl-o-rc-c</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-r-s-u-c-n-i-h-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-r-s-u-c-n-i-l-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-n-ac-l-pr-n-ui-r-s-u-c-n-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-p-ac-h-pr-n-ui-n-s-u-c-l-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cvss-3-0-av-p-ac-l-pr-n-ui-n-s-u-c-h-i-n-a-n</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-1035</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-11</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-119</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-1321</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-16</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-20</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-200</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-201</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-205</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-210</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-211</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-213</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-22</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-248</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-267</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-284</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-285</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-287</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-288</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-295</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-310</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-311</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-312</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-319</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-326</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-327</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-328</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-330</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-347</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-352</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-366</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-400</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-425</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-434</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-473</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-489</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-502</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-506</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-507</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-521</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-523</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-525</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-527</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-530</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-538</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-540</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-548</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-550</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-598</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-601</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-611</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-614</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-639</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-665</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-693</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-698</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-732</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-74</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-78</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-79</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-840</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-88</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-89</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-918</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-93</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-94</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-943</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-98</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-158</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-20</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-200</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-209</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-22</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-23</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-287</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-306</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-352</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-400</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-425</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-434</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-457</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-502</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-601</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-770</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-78</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-79</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-918</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/cwe-cwe-94</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/hipaa-164-206-a</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/hipaa-164-306</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/hipaa-164-306-a</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/hipaa-164-308-a</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/hipaa-164-308-a-1-i</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/hipaa-164-312-a-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/imported-item-148</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-12-2-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-12-5-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-13-1-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-13-1-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-14-1-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-14-1-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-14-1-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-14-2-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-14-2-5-a6886</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-18-1-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-18-1-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-8-1-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-8-2-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-8-2-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-9-2-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-9-2-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-9-4-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-9-4-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-9-4-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a-9-4-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a14-1-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a14-2-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-a9-4-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/iso27001-none</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a6</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a8</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2013-a9</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a01</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a5-766e4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a6</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/owasp-2017-a9</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-2-2-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-6</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-8</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/pci-v3-2-6-5-9</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-13</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-14</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-15</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-16</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-17</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-19</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-20</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-23</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-24</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-25</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-31</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-33</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-34</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-38</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-40</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-42</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-43</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-45</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-6</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-8</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-9</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/classification/wasc-wasc-13</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-1x1-hot-cross-site-fun</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-1x2-machine-learning-perimeter-burning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-1x3-apis-wide-open</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-1x4-another-code-brick-in-the-wall</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-1x5-ciso-on-the-seesaw</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-1x6-appsec-tech-below-deck</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-2x1-revving-scan-engine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-2x2-llm-vulnerability-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-2x3-aspm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-2x4-vibe-coding-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-2x5-dune-and-gloom</loc>
    </url>
<url>
        <loc>https://www.invicti.com/podcasts/appsec-serialized-2x6-owasp-top-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/allocate-software-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/applus-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/case-study-global-financial-services-institution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/channel-4-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/cryptonet-labs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/cz-groep-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/directdefense</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/european-utilities-company</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/fluidra-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/ftco-psi-group</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/gasnetz</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/hesk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/indonesian-financial-services-company</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/ing-bank</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/isaca</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/layers-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/leovegas</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/lkq-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/mme-bvba</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/morneau-shepell</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/mullenlowe-profero</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/network-intelligence</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/new-tribes-mission</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/oakland-university</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/opencart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/park-n-fly-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/rpm-software</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/secwatch</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/south-dakota-bureau-of-information-and-telecommunications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/sumeru-solutions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/sycom</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/t4g</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/trendyol</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/unify</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/wellcome-trust-sanger-institute</loc>
    </url>
<url>
        <loc>https://www.invicti.com/case-studies/zen-internet-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/api-security-vulnerability-testing-real-world-invicti-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/application-security-according-to-iso-27001-invicti-ebook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/aspm-guide-protecting-your-apps-against-supply-chain-threats-like-react2shell</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/blending-speed-with-accuracy-modern-security-testing-tools-fedscoop-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/changing-the-dast-game-with-invicti-iast-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/clp-appsec-indicator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/cover-your-apis-securing-your-hidden-web-attack-surface</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/dast-ciso-security-posture-gauge</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/deobfuscating-javascript-phishing-website</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/ebook-welcome-to-modern-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/enterprise-web-security-best-practices-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/executive-overconfidence-web-application-security-survey-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/exploiting-path-traversal-vulnerabilities-java-web-applications-technical-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/false-positives-in-application-security-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/flexible-deployment-options-invicti-scan-agents-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/gartner-application-security-posture-management-aspm-from-tool-sprawl-to-unified-risk-visibility</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/gartner-streamline-tools-and-practices-for-robust-api-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/good-habits-of-bad-actors-ebook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/healthcare-industry-strengthens-with-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/how-invicti-generates-proof-to-avoid-false-positives</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/how-to-secure-thousands-of-websites-with-a-small-security-team-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/implementing-a-dast-first-appsec-program-with-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/invicti-bolsters-secure-software-development-with-automated-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/latio-application-security-market-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/miercom-report-dast-scanner-competitive-assessment</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/modernizing-application-security-to-scale-for-cloud-native-development</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/prompt-injection-attacks-on-llm-applications-ebook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/security-at-the-speed-of-software-dast-in-the-sdlc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/security-cookies-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/security-issues-in-vibe-coded-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/the-best-approach-to-aspm-with-proof</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/the-future-of-appsec-applying-ai-to-minimize-risk-and-protect-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/the-invicti-appsec-indicator-fall-2022-edition</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/the-invicti-appsec-indicator-spring-2022-edition-worrisome-vulnerability-trends-in-the-race-to-innovation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/web-application-security-vs-network-security-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/web-application-security-without-compromise-a-buyers-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/whitepaper-http-security-headers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/white-papers/whitepaper-same-origin-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/a-day-in-the-life</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/a-unified-approach-to-appsec-enhancing-security-with-dast-and-sast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/a-voyage-of-discovery-understanding-the-growing-importance-of-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/ai-powered-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/all-demo-no-sales-pitch</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/an-integrated-approach-to-scanning-web-apis-with-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/api-security-decoded-emerging-trends-effective-appsec-strategies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/applying-ai-backed-predictive-risk-scoring</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/appsec-and-ai-understanding-the-risks-and-mitigating-them-with-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/better-together-web-application-and-api-security-in-a-single-solution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/building-app-and-api-security-into-development-with-parknfly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/dast-to-sast-correlation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/gauging-your-risks-with-vulnerability-management-leveraging-dynamic-application-security-testing-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/graphql-api-security-and-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/invicti-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/mastering-devsecops-best-practices-learned-from-common-mistakes</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/maturing-your-application-security-program</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/meet-appsec-core</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/modern-application-security-with-esg</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/new-iso27001-requirements-for-a-secure-sdlc-with-vulnerability-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/nosql-security-scanning-finding-and-remediating-mongodb-injection-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/openssl-deep-dive-the-good-the-bad-and-the-not-so-ugly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/proof-based-aspm-the-future-of-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/reflecting-on-2023-in-application-security-and-peering-into-the-future</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/scan-more-fix-more-reduce-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/secure-by-design</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/securing-modern-applications-a-dynamic-approach-to-runtime-threats</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/security-considerations-and-potential-implications-of-ai</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/shadow-ai-appsec-strategies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/shadow-api-find-test-fix</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/step-in-with-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/strengthening-the-security-of-your-software-supply-chain-with-dynamic-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/the-future-of-appsec-applying-ai-to-minimize-risk-and-protect-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/the-road-to-appsec-maturity-scanning-coverage-and-agility</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars/why-dast-first</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/about</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/blind-cross-site-scripting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/blind-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/broken-link-hijacking-blh</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/buffer-overflow-stack-overflow-heap-overflow</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/clickjacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/cookie-hijacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/cookie-poisoning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/cookie-security-flags</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/crlf-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/cross-frame-scripting-xfs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/cross-site-request-forgery-csrf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/cross-site-scripting-xss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/directory-listing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/directory-traversal-path-traversal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/dom-based-cross-site-scripting-dom-xss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/dynamic-application-security-testing-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/email-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/forced-browsing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/high-orbit-ion-cannon-hoic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/host-header-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/html-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/http-strict-transport-security-hsts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/in-band-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/insecure-direct-object-references-idor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/integer-overflow</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/interactive-application-security-testing-iast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/json-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/local-file-inclusion-lfi</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/low-orbit-ion-cannon-loic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/man-in-the-middle-attacks-mitm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/mitm-arp-spoofing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/mitm-dns-spoofing-dns-cache-poisoning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/mitm-https-spoofing-idn-homograph-attack</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/mitm-ip-spoofing-ip-address-spoofing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/mitm-ssl-hijacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/mitm-ssl-stripping</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/nosql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/open-redirect-open-redirection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/os-command-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/out-of-band-sql-injection-oob-sqli</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/out-of-band-xml-external-entity-oob-xxe</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/password-reset-poisoning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/privilege-escalation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/protection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/reflected-xss-non-persistent-cross-site-scripting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/remote-code-execution-rce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/remote-file-inclusion-rfi</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/reverse-shell</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/rudy-attack</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/same-origin-policy-sop</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/seo-poisoning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/server-side-request-forgery-ssrf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/session-fixation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/session-hijacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/session-prediction</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/slowloris-attack</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/software-composition-analysis-sca</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/source-code-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/sql-injection-sqli</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/static-application-security-testing-sast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/stored-xss-persistent-cross-site-scripting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/unvalidated-redirects-and-forwards</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/vulnerability-assessment</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/vulnerability-management</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/web-application-firewall-waf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/web-asset-discovery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/web-cache-poisoning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/web-shell</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/xml-external-entity-xxe</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn/xss-filter-evasion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-blind-sql-injection-vulnerability-in-pragyan-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-and-sql-injection-vulnerabilities-in-e107</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-and-sql-injection-vulnerabilities-in-samnews</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-ruubikcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-sql-injection-vulnerabilities-boastmachine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-sql-injection-vulnerabilities-gnew</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-andy-php-knowledgebase</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-ajenti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-booked-scheduler</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-claronline</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-dokeos</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-fisheye</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-flatnuke</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-flatpress</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-maian-weblog</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-myseatxt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-osticket</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-phpalbum</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-pragyan-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-pyrocms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-responsive-file-manager</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-storytlr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-teamcity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-tiki-wiki-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerabilities-in-usebb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerability-in-kajonacms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerability-in-october-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/critical-xss-vulnerability-in-sql-buddy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cross-site-scripting-vulnerability-in-invision-power-board</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2014-9325-xss-vulnerability-in-twiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2014-9367-xss-vulnerability-in-twiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-1384-xss-vulnerability-in-banner-effect-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-1385-xss-vulnerability-in-blubrry-powerpress</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-2250-multiple-xss-vulnerabilities-identified-in-concrete5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-2261-sql-injection-vulnerability-identified-in-minibb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-2262-xss-vulnerability-identified-in-minib</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-3429-dom-xss-vulnerability-in-twenty-fifteen-wordpress-theme</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-4671-xss-vulnerability-identified-in-opencart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-6238-multiple-xss-vulnerabilities-in-google-analyticator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-6384-xss-vulnerability-identified-in-datatables</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-7348-multiple-xss-vulnerabilities-identified-in-ztree</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-7390-sql-injection-vulnerability-in-testlink</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-7391-multiple-xss-vulnerabilities-identified-in-testlink</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/cve-2015-8603-xss-vulnerability-identified-in-serendipity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/http-header-injection-litespeed-web-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/lfi-and-xss-vulnerabilities-in-codiad</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/lfi-vulnerability-in-osclass</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/local-file-inclusion-vulnerability-in-tomatocart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/multiple-xss-vulnerabilities-in-koolphp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/multiple-xss-vulnerabilities-in-zikula</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-14-043-multiple-sql-injection-vulnerabilities-in-openbiz-cubi</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-14-044-multiple-xss-vulnerabilities-in-openbiz-cubi</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-14-045-rce-vulnerability-in-openbiz-cubi</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-003-multiple-xss-vulnerabilities-in-articlefr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-004-local-file-inclusion-vulnerabilitiy-in-articlefr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-009-multiple-xss-vulnerabilities-identified-in-wp-flash-player</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-010-xss-vulnerability-identified-in-phpmoadmin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-011-xss-vulnerability-identified-in-pligg-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-012-xss-vulnerability-identified-in-phpmemadmin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-017-multiple-xss-vulnerabilities-identified-in-booked-scheduler</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-018-csrf-vulnerability-identified-in-booked-scheduler</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-020-dom-xss-vulnerability-identified-in-icheck</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-021-dom-xss-vulnerabilities-identified-in-scrollmagic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-15-022-multiple-xss-vulnerabilities-identified-in-bootstrap-validator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-002-xss-vulnerability-identified-in-mailpoet-newsletters</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-003-multiple-xss-vulnerabilities-identified-in-bulletproof-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-003-multiple-xss-vulnerabilities-identified-in-cubecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-005-open-redirection-vulnerability-identified-in-smartstore</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-006-multiple-xss-vulnerabilities-identified-in-saurus-cms-4-7-final</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-007-self-xss-vulnerability-identified-in-yoast-seo-3-3-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-008-multiple-stored-xss-vulnerability-identified-in-clicky-by-yoast-1-4-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-009-reflected-xss-vulnerability-identified-in-wp-polls-2-73</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-010-reflected-xss-vulnerability-identified-in-pagekit-1-0-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-011-multiple-xss-vulnerabilities-identified-in-kajona-v5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-012-reflected-xss-vulnerability-identified-hesk-2-6-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-013-multiple-reflected-xss-vulnerabilities-in-beehive-forum-1-4-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-014-reflected-xss-vulnerability-in-ovidentia-8-4-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-015-multiple-reflected-xss-vulnerabilities-in-cockpit-0-13-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-016-multiple-remote-code-evaluation-rce-vulnerabilities-in-cockpit-0-13-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-017-multiple-reflected-xss-vulnerabilities-in-dotclear-2-9-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-018-blind-sql-injection-vulnerability-in-eggblog-4-1-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-019-multiple-reflected-xss-vulnerabilities-in-eggblog-4-1-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-020-reflected-xss-vulnerability-in-storytlr-1-2-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-16-021-reflected-and-stored-xss-vulnerability-in-typesetter-cms-5-0-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-001-multiple-reflected-xss-vulnerabilities-in-collabtive-2-1-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-002-multiple-reflected-xss-vulnerabilities-in-mylittleforum-2-3-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-003-multiple-reflected-xss-vulnerabilities-in-spiderfoot-2-7-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-004-multiple-reflected-xss-vulnerabilities-in-nodcms-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-005-blind-sql-injection-vulnerability-in-sweetrice-1-5-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-006-reflected-xss-vulnerability-in-yii-framework-2-0-9</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-007-multiple-reflected-xss-vulnerabilities-in-powebform-1-0-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-008-reflected-xss-vulnerability-in-hexjector-1-0-7-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-009-reflected-xss-vulnerability-in-otp-1-0-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-010-reflected-xss-vulnerability-in-upload-script-for-images-and-audio-files</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-011-reflected-xss-vulnerability-in-dirlist-0-3-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-012-reflected-xss-vulnerability-in-phprft-1-0-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-013-reflected-xss-vulnerability-in-simple-picture-gallery-manager-1-4-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-014-multiple-reflected-xss-vulnerabilities-in-phpbb-template-test-suite-2-0-11</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-015-multiple-reflected-xss-vulnerabilities-in-content2-2013-01-21</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-016-blind-sql-injection-vulnerability-in-content2-2013-01-21</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-017-reflected-xss-vulnerability-in-maxforum-2-0-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-018-reflected-xss-vulnerability-in-phupload-0-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-019-reflected-xss-vulnerability-in-infoerp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-020-multiple-reflected-xss-vulnerabilities-in-free-cmms-0-04</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-021-reflected-xss-vulnerability-in-online-inventory-manager-3-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-023-multiple-reflected-xss-vulnerabilities-in-vfront-0-99-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-024-reflected-xss-vulnerability-in-phproxy-0-5-b2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-025-multiple-reflected-xss-vulnerabilities-in-phftp-4-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-026-reflected-xss-vulnerability-in-pluxml-5-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-027-multiple-reflected-xss-vulnerabilities-in-chronosite-5-1-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-028-multiple-blind-sql-injection-vulnerabilities-in-chronosite-5-1-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-029-reflected-xss-vulnerability-in-wirawan-test-10okt2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-030-multiple-reflected-xss-vulnerabilities-in-phpfkl-lite</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-031-reflected-xss-vulnerability-in-cms-made-simple</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-17-032-server-side-template-injection-vulnerability-in-cms-made-simple</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-001-multiple-xss-vulnerabilities-in-gibbon</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-002-frame-injection-vulnerabilities-in-gibbon</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-003-multiple-reflected-xss-in-tcexam</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-004-reflected-xss-in-omeka</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-005-stored-cross-site-scripting-in-bigtreecms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-006-reflected-cross-site-scripting-in-dotclear</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-007-cross-site-scripting-vulnerabilities-in-tangobb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-008-cross-site-scripting-in-clippercms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-009-frame-injection-vulnerabilities-in-tikiwiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-010-cross-site-scripting-in-tikiwiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-011-stored-cross-site-scripting-in-inoerp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-012-stored-cross-site-scripting-in-platformus</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-013-cross-site-request-forgery-in-platformus</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-014-php-code-evaluation-in-wolfcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-015-multiple-cross-site-scripting-vulnerabilities-in-dolibarr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-016-reflected-xss-vulnerability-in-bigtree-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-017-cross-site-request-forgery-vulnerabilities-in-serenity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-018-sql-injections-in-fuelcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-019-code-evaluations-in-fuelcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-020-cross-site-scripting-vulnerabilities-in-carbon-forum</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-021-open-redirection-vulnerabilities-in-eventum</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-022-reflected-cross-site-scripting-vulnerabilities-in-seopanel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-023-sql-injection-blind-sql-injection-in-soplanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-024-multiple-cross-site-scripting-vulnerabilities-in-freshrss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-025-reflected-cross-site-scripting-in-cubecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-026-reflected-cross-site-scripting-in-typesetter</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-027-cross-site-scripting-in-chamilo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-028-sql-injections-in-chamilo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-029-cross-site-scripting-in-osclass</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-030-cross-site-scripting-in-plikli</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-031-blind-sql-injection-in-plikli</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-032-stored-cross-site-scripting-in-forkcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-033-cross-site-scripting-in-impresscms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-034-code-evolution-php-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-035-cross-site-scripting-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-036-sql-injection-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-037-open-redirection-vulnerability-in-forkcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-038-reflected-cross-site-scripting-in-microweber</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-039-cross-site-scripting-in-genixcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-040-cross-site-scripting-in-family-connection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-041-dom-cross-site-scripting-in-sharrre</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-042-reflected-cross-site-scripting-in-mantis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-043-cross-site-scripting-in-zenphoto</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-044-open-redirection-in-orangeforum</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-045-xml-external-entity-injection-vulnerability-in-blogengine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-046-reflected-cross-site-scripting-in-ampache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-047-cross-site-scripting-in-fluxbb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-048-cross-site-scripting-in-dnn</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-049-cross-site-scripting-in-abantecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-050-cross-site-scripting-in-coppermine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-051-stored-cross-site-scripting-in-podcastgenerator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-052-reflected-cross-site-scripting-in-collabtive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-053-reflected-cross-site-scripting-in-webid</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-054-cross-site-scripting-in-pluxml</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-055-boolean-sql-injection-in-monica</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-056-open-redirection-vulnerability-in-getsimplecms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-057-cross-site-scripting-in-zencart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-058-sql-injection-in-inoerp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-059-cross-site-scripting-in-htmly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-060-cross-site-scripting-in-elkarte</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-18-061-cross-site-scripting-in-projectsend</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-001-reflected-cross-site-scripting-in-kanboard</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-002-reflected-cross-site-scripting-in-vfront</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-003-stored-cross-site-scripting-in-vfront</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-004-cross-site-scripting-in-shopware</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-005-reflected-cross-site-scripting-in-ponzu-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-006-reflected-cross-site-scripting-in-phpfk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-007-code-evaluation-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-008-reflected-cross-site-scripting-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-009-out-of-band-code-evaluation-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-010-stored-cross-site-scripting-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-011-frame-injection-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-012-open-redirection-in-zurmo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-013-csrf-vulnerabilities-in-django-crm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-014-reflected-cross-site-scripting-in-openedx</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-016-cross-site-scripting-in-ilchcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-017-cross-site-scripting-in-erpnext</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-19-018-frame-injection-in-erpnext</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-20-001-cross-site-scripting-in-geeklog</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-20-002-blind-sql-injection-in-geeklog</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-20-003-cross-site-scripting-in-ilchcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-20-004-cross-site-scripting-in-bigtreecms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-20-005-cross-site-scripting-in-seopanel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-20-006-sql-injection-in-seopanel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-21-001-cross-site-scripting-in-chamilo-lms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-21-002-cross-site-scripting-in-zen-cart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-21-003-cross-site-scripting-in-ampache</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/ns-21-004-cross-site-scripting-in-kajona</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/open-redirection-vulnerability-in-opal-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/open-redirection-vulnerability-in-orchard</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/sql-injection-vulnerabilities-in-mymarket</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/sql-injection-vulnerability-in-batavi-ecommerce</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/sql-injection-vulnerability-in-glfusion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/sql-injection-vulnerability-in-openemr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/web-applications-advisories-xss-vulnerability-in-tracks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-blind-sql-injection-vulnerabilities-in-banana-dance-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-blind-sql-injection-vulnerabilities-in-exponentcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-csrf-vulnerabilities-in-gutuma</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-sql-injection-vulnerabilities-in-bilboplanet</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-sql-injection-vulnerabilities-in-coursems</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-sql-injection-vulnerabilities-in-dbhcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-sql-injection-vulnerabilities-in-dotproject</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-sql-injection-vulnerabilities-in-jara</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-sql-injection-vulnerabilities-in-minibb</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-sql-injection-vulnerabilities-in-ordersys</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-and-sql-injection-vulnerabilities-in-symphony-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-csrf-and-multiple-other-vulnerabilities-in-cubecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-lfi-and-sql-injection-vulnerabilities-in-achievo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-bloofoxcms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-clipbucket</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-cmsmini</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-impress-cms-content-module</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-labwiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-litecart</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-mintboard</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-osclass</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-phpfreechat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-serendipity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-taskfreak</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerabilities-in-xoda</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-efront</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-enanocms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-gazie</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-joomla</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-joomla-163</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-little-poll</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-oxwall</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-pagecookery-microblog</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-peoplepods</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-projectsend</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-redmine</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-sharetronix</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-sitecake</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-storytlr</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-subrion-cms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-the-bug-genie</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-twiki</loc>
    </url>
<url>
        <loc>https://www.invicti.com/web-applications-advisories/xss-vulnerability-in-twiki5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/2016-year-review</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/2016-year-review-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/73-percent-organizations-to-increase-appsec-investment-in-2023-invicti-research</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/afcea-west-2024-building-seven-pillars-zero-trust</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/announcing-netsparker-radar-application-discovery-service</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/announcing-secure-by-design-webinar-series</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/appsec-innovator-invicti-appoints-cybersec-veteran-sonali-shah-as-chief-product-officer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/appsec-innovator-invicti-continues-record-growth-powered-by-continued-success-in-the-enterprise-sector</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/automatically-detect-vulnerabilities-google-web-toolkit-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/award-wins-showcase-invicti-security-early-momentum-in-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/black-box-scanners-misconceptions-security-weekly-492</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/black-hat-2021-what-we-do-not-know-may-be-the-greatest-cybersecurity-threat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/black-hat-usa-2020-virtual-event</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/bouncing-back-how-your-agency-can-handle-disruption-and-embrace-resilience</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/celebrating-10-years-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/comparison-automated-web-application-security-scanners-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/comparison-web-vulnerability-scanners-netsparker-2013-2014</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/consumers-web-applications-most-risk-hacked</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/cyber-security-digital-summit-fall-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/cyber-threat-intelligence-summit-solutions-track</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/cybersecurity-breakthrough-award-vulnerability-management-solution-provider-of-the-year</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/detect-dom-based-cross-site-scritping-vulnerabilities-netsparker-release</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/dev-sec-convergence-new-research-details-progress-and-challenges-on-the-road-to-secure-innovation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/dom-xss-vulnerability-wordpress-default-theme-twenty-fifteen</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/end-of-life-netsparker-community-edition</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/enlisted-on-the-uk-digital-marketplace</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibit-infosecurity-online-2020-virtual-event</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibit-phpkonf-2017-istanbul</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-4th-cyber-warfare-and-security-conference-in-ankara</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-black-hat-europe-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-black-hat-usa-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-black-hat-usa-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-gartner-symposium-itxpo-conference-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-global-appsec-dc-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-infosecurity-europe-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-nopcon-hacker-conference-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-owasp-appsec-eu-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-owasp-appsec-usa-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-rsa-conference-san-francisco-usa-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-rsa-conference-san-francisco-usa-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/exhibiting-rsa-conference-san-francisco-usa-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/ferruh-mavituna-interviewed-netsparker-glocal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/ferruh-mavituna-interviewed-netsparker-help-net-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/gdpr-survey-executives</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/global-appsec-2020-virtual</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/hello-from-invicti-security-a-new-identity-for-our-family-of-products</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/how-facebook-stored-passwords-in-plain-text</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/infographic-open-source-web-applications-vulnerability-statistics-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/infographic-open-source-web-applications-vulnerability-statistics-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/integrating-netsparker-enterprise-with-gitlab</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-acquires-kondukto-to-deliver-proof-based-aspm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-announces-climb-channel-solutions-as-first-uk-distribution-partner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-brands-acunetix-and-netsparker-named-a-2020-gartner-peer-insights-customers-choice-for-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-by-invicti-exhibiting-at-2021-air-space-cyber-conference</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-by-invicti-exhibiting-at-black-hat-usa-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-exhibiting-at-black-hat-usa-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-exhibiting-at-infosec-europe-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-exhibiting-at-it-sa-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-exhibiting-at-rsa-conference-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-exhibiting-at-rsa-conference-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-exhibiting-at-rsa-conference-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-expands-appsec-platform-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-gartner-peer-insights-customers-choice-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-launches-dast-to-sast-correlation-to-help-devops-fix-verified-runtime-risks-at-pipeline-speed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-launches-first-ai-enabled-risk-scoring-for-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-launches-new-partner-portal-support-for-acunetix-and-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-launches-next-gen-application-security-platform-with-ai-powered-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-launches-servicenow-integration-delivers-automated-workflows-vulnerability-discovery-remediation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-leads-in-miercom-dast-scanner-security-benchmark</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-licenses-for-covid-relief</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-malta-cybersecurity-roadshow-2022-mcast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-named-a-challenger-in-2022-gartner-magic-quadrant-for-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-named-a-winner-of-the-2021-austin-american-statesman-top-workplaces-award</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-on-microsoft-azure-marketplace-easier-access-to-best-in-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-parent-company-invicti-security-recognized-as-a-great-place-to-work</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-rebrands-bringing-appsec-with-zero-noise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-recognized-on-the-2021-gartner-magic-quadrant-for-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-recognizes-guidepoint-security-as-2023-north-american-partner-of-the-year</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-research-finds-executive-overconfidence-is-a-security-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-rsa-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-rsa-2020-press-release</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-achieves-iso-27001-2022-accreditation-for-all-products</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-adds-software-composition-analysis-to-its-industry-leading-appsec-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-and-esg-report-how-companies-automate-application-security-testing-for-faster-development</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-announces-625-million-growth-investment-led-by-summit-partners</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-announces-alex-bender-chief-marketing-officer-john-mandel-senior-vice-president-engineering</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-announces-matthew-sciberras-vp-information-security-and-ciso-promotes-mike-mattos-chief-customer-officer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-appoints-frank-catucci-as-cto-and-head-of-security-research</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-appoints-gerhard-watzinger-chairman-of-board</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-appoints-kevin-gallagher-president</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-appoints-michael-george-as-ceo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-appoints-steven-fitz-as-chief-revenue-officer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-at-cybertalks-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-awarded-best-place-to-work-again-2026</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-delivers-another-quarter-of-outstanding-results</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-gains-momentum-delivers-zero-noise-approach-to-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-is-named-in-2021-gartner-magic-quadrant-for-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-joins-aws-marketplace</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-mend-io-partner-to-bring-customers-full-spectrum-appsec-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-names-jeff-bray-chief-financial-officer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-on-inc-5000-list-fastest-growing-companies-usa</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-ranks-no-16-on-inc-magazines-list-of-the-fastest-growing-private-companies-in-texas</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-recognizes-global-channel-partners-with-inaugural-awards</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-releases-enterprise-class-iast-solution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-reports-on-lost-year-in-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-reports-record-growth-and-profitability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-security-unveils-corporate-rebrand-reflecting-mission-deliver-appsec-zero-noise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-sponsors-owasp-lightning-conference</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-to-provide-complimentary-licenses-to-governments-and-healthcare-agencies-worldwide-to-support-pandemic-communications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/invicti-vp-of-engineering-kalpana-tummala-honored-with-sc-media-women-in-it-award</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/john-andrews-appointed-vp-of-global-channel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/john-andrews-joins-invicti-security-as-vp-of-global-channel</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/latio-2026-application-security-market-report-recognizes-invicti-as-leader-and-innovator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/lessons-learned-from-our-groundhog-day-software-release</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/market-leader-web-vulnerability-scanners-comparison</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/missed-blackhat-defcon-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-3-1-full-support-html5-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-3-finds-more-vulnerabilities-automates-web-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-accuracy-and-time-costs-of-web-application-security-scanner-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-and-the-digital-transformation-in-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-announces-new-fogbugz-issue-synchronization-feature</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-announces-new-jira-issue-synchronization-feature</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-detects-ruby-on-rails-remote-code-execution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-enterprise-update-2fa-improvements</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-exhibit-sponsor-owasp-appsec-europe-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-exhibiting-infosecurity-europe-london</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-exhibiting-rsa-conference-2017-singapore</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-exhibition-istanbul-security-conference</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-finalist-red-herring-top-100-europe-awards</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-interview-at-rsa-conference-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-introduces-more-automation-web-application-security-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-is-now-invicti-new-era-modern-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-is-now-invicti-signaling-a-new-era-for-modern-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-launch-online-web-application-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-lunarline-vulnerability-scan-converter-support</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-partner-reseller-strong-crypto-innovations</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-rsa-conference-2014</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-rsa-conference-2016-abu-dhabi</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-rsa-conference-2016-usa</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-rsa-conference-san-francisco-usa-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-rsa-conference-usa-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-s-2019-the-year-in-review</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-softprom-sign-global-distribution-contract</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-sponsor-exhibition-hacktrick-security-conference</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-sponsor-exhibition-phpkonf-2015-istanbul</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-sponsors-bsides-manchester-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-sponsors-lets-encrypt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/netsparker-threadfix-optimizing-web-application-security-program</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/new-invicti-research-indicates-cybersecurity-pros-app-developers-save-companies-1m-preventing-breaches</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/new-invicti-research-reveals-proof-based-scanning-automatically-confirms-94-of-direct-impact-vulnerabilities-with-99-98-accuracy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/new-invicti-research-reveals-proof-based-scanning-automatically-confirms-94-percent-of-direct-impact-vulnerabilities-with-99-percent-accuracy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/new-invicti-research-vulnerabilities-on-the-rise-public-sector-particularly-at-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/new-oauth2-authentication-feature</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/new-vp-of-global-channel-for-invicti-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/new-vulnerability-families-features</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/pci-scanning-announcement</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/picking-up-clear-signal-owasp-2023-global-appsec-dublin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/press-release-cybersecurity-survey-80-percent-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/queens-award-for-enterprise-international-trade</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/reflecting-on-dodiis-2022-zero-trust-strategic-partnerships-government</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/report-45-percent-increase-web-application-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/scan-websites-imagetragick-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/scan-your-web-applications-with-your-xbox-and-playstation-from-the-comfort-of-your-sofa</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sdd-software-design-development-conference2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/secnesys-netsparker-reseller-mexico</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/shifting-security-left-with-devsecops-atarc-webinar</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/south-african-police-whistleblowers-hacked-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-boston-application-security-conference-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-bsides-dc-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-bsides-dc-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-exhibit-jampasec-2015-brazil</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-ismg-2020-virtual-cybersecurity-summit-new-york</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-owasp-appsec-california-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-owasp-appsec-california-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-owasp-appsec-california-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-owasp-appsec-usa-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsor-phpkonf-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sponsoring-lonestar-application-security-conference-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/sql-injection-joomla-cms-full-administrative-privileges</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/state-and-local-cybersecurity-grant-program-requirements</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/survey-cybersecurity-in-the-new-year</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/survey-government-financial-services-vulnerable-industries</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/survey-results-secure-websites-more-revenue</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/survey-vulnerable-web-applications-developers-easy-target-behind-firewall</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/tech-data-and-invicti-security-partner-to-extend-distribution-into-apac</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/the-austin-american-statesman-names-invicti-a-winner-of-the-austin-top-workplaces-2020-award</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/turn-river-capital-investment-accelerate-growth</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/twenty-percent-time</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/uncover-web-application-vulnerabilities-netsparker-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/unlimited-web-security-scans-for-developers-of-open-source-projects</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/update-all-invicti-products-now-detect-log4j-related-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/us-agencies-secure-critical-software-omb-memo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/veteran-software-sales-leader-lou-difruscio-joins-invicti-security-as-chief-revenue-officer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/web-application-security-testing-automation-interview-risky-business-447</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/web-application-security-webinar-brinqa-march-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/web-developers-survey</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/web-service-vulnerability-scanner-netsparker-automatic-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/weekly-security-roundup-week-51-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/what-invicti-agreement-with-td-synnex-means-for-customers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/win-owasp-appsec-europe-2017-tickets</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/womens-day-seyma-kara</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/news/wordpress-vs-custom-web-applications-security-weekly-463</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/10-best-dast-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/10-best-vulnerability-scanning-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/2020-year-review-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/2021-in-cybersecurity-invicti-blog-roundup</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/2024-cwe-top-25-list-xss-sqli-buffer-overflows</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/23-nycrr-part-500-compliance-guide-to-nydfs-cybersecurity-rules</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/3-appsec-headaches-to-cure-with-predictive-risk-scoring</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/3-reasons-2024-will-be-a-year-of-cybersecurity-noise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/3-types-of-vulnerability-scanners</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/3-ways-security-tool-sprawl-hurts-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/3-ways-using-asvs-can-help-your-organization</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/4-ways-appsec-analytics-help-devsecops-work-smarter-not-harder</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/4-ways-to-improve-appsec-accountability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-circular-phases-of-sec-in-devsecops</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-easy-wins-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-major-benefits-of-early-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-mistakes-to-avoid-when-building-devsecops</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-reasons-a-bug-bounty-program-is-not-enough</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-reasons-web-security-as-important-as-endpoint-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-reasons-why-dast-is-the-future-of-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-reasons-why-web-security-is-crucial-to-avoid-ransomware</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-stages-of-penetration-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-steps-enterprise-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-steps-improving-cybersecurity-posture</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/5-ways-a-cyberattack-can-hurt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/6-application-layer-ddos-attacks-signals-and-indicators</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/7-principles-of-secure-design-in-software-development-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/7-reasons-why-development-teams-skip-security-steps</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/7-steps-to-avoid-uncoordinated-vulnerability-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/a-look-into-modern-security-orchestration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/acquiring-data-with-css-selectors-and-javascript-on-time-based-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/advantages-signature-heuristic-web-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/agentic-pentesting-guide-for-modern-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/agentic-pentesting-vs-dast-vs-manual-pentests</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/agile-development-waterfall-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ai-and-the-expanding-application-attack-surface</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ai-in-devsecops-enhancing-security-across-the-sdlc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ai-remediation-a-massive-time-saver</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ai-security-challenges-best-practices-for</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ai-wont-kill-appsec-it-will-clarify-what-matters-most</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/all-about-pci-compliance-pci-dss-good-bad-insecure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/amazons-ai-coding-troubles-point-to-an-industry-wide-control-problem</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/analysis-web-application-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/analyzing-security-github-copilot-suggestions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/angular-xss-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/announcing-deobfuscating-javascript-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/announcing-enterprise-web-security-best-practices-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/announcing-false-positives-in-web-application-security-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/announcing-flexible-deployment-options-invicti-scan-agents-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/announcing-how-to-secure-thousands-of-websites-with-a-small-security-team-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/announcing-the-invicti-whitepaper-web-application-security-or-network-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/announcing-true-iast-invicti-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/apacheorg-and-jira-incident</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/api-discovery-and-visibility</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/api-pen-testing-vs-continual-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/api-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/api-scanning-and-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/api-security-best-practices</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/api-security-best-practices-for-modern-architectures</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/api-security-scanning-with-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/api-vulnerability-scans-to-run-first</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/apis-creep-up-on-you-how-to-stay-secure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/apis-make-xss-prevention-frontend-job</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/apple-app-site-association</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-level-denial-service-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-security-automation-scaling-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-security-champions-program</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-security-checklist-essential-steps-for-secure-development</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-security-controls</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-security-risk-federal-agencies-lets-talk-about-risk-ebook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-security-starts-with-design-and-development</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-security-vital-throughout-sdlc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-security-weekly-60-sven-morgenroth</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/application-vulnerability-scanner-alternatives</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/applications-routinely-released-with-vulnerabilities-invicti-appsec-indicator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/appsec-best-practices-for-application-security-that-sticks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/appsec-debt-hurts-make-it-stop</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/appsec-failures-we-keep-repeating-and-how-to-break-the-cycle-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/appsec-gets-real-reflecting-on-rsa-conference-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/appsec-in-the-age-of-ai-powered-attacks-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/appsec-kpis-that-matter</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/appsec-last-line-of-truth-in-ai-generated-software-world-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/appsec-roi-ciso-metrics</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/are-you-sure-that-vulnerability-is-fixed-continuous-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/aspm-and-security-testing-orchestration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/aspm-customizable-roles-and-permissions-for-enterprise-granular-access</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/aspm-implementation-challenges-at-scale-what-breaks-and-why</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/aspm-vendors-what-to-look-for-in-aspm-solution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/aspm-vs-asoc-key-differences-for-enterprise-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/aspm-vs-cnapp-where-does-cloud-security-end-and-application-security-begin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/aspm-vs-dast-vs-sast-vs-sca</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/aspm-with-asset-discovery-how-application-centric-visibility-works</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/audit-ready-appsec-for-pci-hipaa-iso-compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/automated-api-vulnerability-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/automatic-web-application-vulnerability-testing-detection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/automating-dast-in-ci-cd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/automation-beat-security-complexity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/avoid-api-blind-spots-in-web-application-security-testing-announcing-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/axios-hijacked-npm-supply-chain-attack-distributed-cross-platform-rat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/behind-scenes-onion-services</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/benefits-of-automating-issue-opening-process</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-application-security-platforms-with-ci-cd-integration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-application-security-tools-platform-guide-and-checklist</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-appsec-platforms-with-container-support-for-modern-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-aspm-platforms-for-enterprise-appsec-in-regulated-industries</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-cloud-native-application-security-solutions-for-modern-apps</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-enterprise-dast-tool-for-regulated-industries</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-enterprise-dast-tools-for-large-enterprises-buyers-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-enterprise-vulnerability-scanner-at-scale</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-in-dast-how-to-select-dast-tools-for-devsecops</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-of-2020-invicti-blog</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-tools-for-automated-application-security-testing-appsec-tools-that-matter-most</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-tools-for-javascript-and-node-js-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-vulnerability-management-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-vulnerability-scanner-for-microservices-architectures</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/best-vulnerability-scanner-for-regulated-industries</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/biden-harris-national-cyber-workforce-strategy-for-cybersecurity-skills-gap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/black-box-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/black-box-testing-role-in-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/black-hat-2022-recap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/borrowing-good-habits-from-bad-actors-announcing-ebook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/bots-never-sleep-keeping-up-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/brave-browser-sacrifices-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/bring-your-own-data-byod-to-the-invicti-aspm-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/bringing-vulnerability-scanning-in-house</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/broken-access-control</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/broken-object-level-authorization-bola</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/bruteforce-wordpress-local-networks-xshm-attack</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/buffer-overflow-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/build-mature-application-security-program</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/building-accurate-dast-into-ci-cd-saves-time-and-money</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/building-devsecops-tools-culture-atarc-webinar</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/building-robust-web-application-security-program</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/building-secure-by-default-a-guide-to-zero-cve-container-images</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/building-strong-appsec-core-runtime-validation-makes-or-breaks-a-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/burnout-the-hidden-threat-in-cybersecurity-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/bypass-disabled-system-functions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/can-you-afford-to-cut-back-on-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/centralized-vulnerability-management-for-banking-and-finance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/channel-4-improves-security-and-efficiency-with-invicti-case-study</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/choosing-mssp-ask-about-dast-for-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/choosing-open-source-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/chrome-68-ssl-tls-implementation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cisa-zero-trust-maturity-model-modern-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/clickjacking-attack-on-facebook-how-tiny-attribute-save-corporation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/clickjacking-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/close-automation-gap-in-enterprise-app-sec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/closing-security-gaps-in-development-workflows-iso-27001-compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cloud-native-security-devsecops-benefits</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/code-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/collision-based-hashing-algorithm-disclosure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/command-injection-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/comparing-api-discovery-runtime-and-edge-views</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/comparison-commercial-non-commercial-web-application-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/compliance-scan-vs-vulnerability-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/components-of-dynamic-application-security-testing-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/container-security-a-quick-overview</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/content-security-policy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/content-security-policy-csp-demo-podcast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/content-security-policy-csp-header-not-set-vulnerability-how-to-fix-it</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/content-type-status-code-leakage</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cost-of-fragmented-appsec-why-enterprises-need-aspm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/course-introduction-web-application-security-penetration-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/covid-19-crisis-cyberattacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/create-sbom-on-gradle-with-the-cyclonedx-plugin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/critical-role-of-cve-in-cybersecurity-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/crlf-http-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cross-frame-scripting-xfs-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cross-site-cookie-manipulation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cross-site-scripting-react-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cross-site-scripting-xss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cryptographic-failures</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/csrf-cross-site-request-forgery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/csrf-vulnerability-yandex-browser</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/customer-feedback-drives-continuous-improvements</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/customizable-roles-and-permission-in-aspm-platforms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cutting-edge-conundrum-why-federal-agencies-cannot-compromise-on-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cutting-through-uncertainty-proof-based-scanning-announcing-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cve-2014-6271-shellshock-bash-vulnerability-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cvss-4-0-more-useful-vulnerability-scoring</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cvss-characterizing-and-scoring-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cwe-sans-top-25-software-errors-for-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cwe-top-25-software-weaknesses-2023-analysis-practical-use</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cyber-incident-response-plan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cyber-resilience-act-cra-compliance-checklist-for-software-products</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cybersecurity-awareness-for-life-not-just-october</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cybersecurity-framework-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/cybersecurity-skills-gap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/damage-limitation-strategies-for-developers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dangerous-complexity-of-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dangers-open-git-folders</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dangers-outdated-web-technologies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-and-sca-stronger-appsec-together</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-first-devsecops-integration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-first-mindset-ciso-perspective-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-for-api-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-for-graphql</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-for-layered-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-for-legacy-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-for-microservices-and-kubernetes</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-iast-sca-deeper-coverage-single-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-multitool-web-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-role-in-sdlc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-to-sast-correlation-fix-verified-runtime-risks-at-pipeline-speed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-tool-setup-support</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-tools-force-multipliers-for-human-cybersecurity-skills</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-vs-penetration-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-vs-runtime-application-self-protection-rasp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-vs-sast-fact-check-on-static-and-dynamic-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dast-vs-vapt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/debunking-5-dast-myths</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/decluttering-security-with-effective-application-scanning-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/defenders-dilemma-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/defensive-programming-tips</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/define-cybersecurity-metrics-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/definitive-pci-dss-compliance-guide-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/demo-exploiting-blind-xss-second-order-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/developers-shouldnt-have-to-care-about-security-opinion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/developers-web-application-security-problem-development-process</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/devsecops-engineer-skills</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/devsecops-for-banking-and-finance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/devsecops-hurdles-federal-agencies-modern-security-approach-atarc-webinar</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/devsecops-mistakes</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/devsecops-vs-secdevops-whats-the-difference</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/devsecops-waterfall-development-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/difference-between-vulnerability-assessments-and-penetration-tests</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/directory-path-traversal-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/disable-directory-listing-web-servers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/discovering-apis-interview-on-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/discovering-hacking-iot-devices-using-web-based-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/discovering-websites-business-security-weekly-129</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/diy-application-security-pitfalls</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dnsfs-dns-file-system</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/docker-security-best-practices-with-semgrep</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/doj-review-urges-zero-trust-adoption-fortify-security-posture</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dom-based-cross-site-scripting-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dont-shift-left-shift-smarter-with-dast-first</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dora-compliance-checklist-how-to-prepare-for-the-digital-operational-resilience-act</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dora-framework-mandates-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dos-vulnerability-fogbugz-manuscript</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/dynamic-code-analysis-in-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/easily-exploitable-vulnerabilities-in-oracle-weblogic-server</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/easy-to-use-web-vulnerability-scanner-more-secure-websites</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ebpf-vulnerabilities-ecosystem-and-security-model</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/economics-of-ai-powered-appsec-what-decision-makers-need-to-know</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/economics-of-aspm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/edr-vs-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/eliminating-false-positives-at-scale-enterprise-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/empowering-developers-in-application-security-triage-and-collaboration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/empowering-developers-in-appsec-scaling-and-metrics</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/end-of-coinhive-service-rise-of-cryptojacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/end-of-support-for-php-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enhancing-appsec-through-fuzzing-in-ci-cd-pipelines</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enhancing-security-with-ebpf-use-cases-explored</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enhancing-vulnerability-management-with-threat-intelligence</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enterprise-continuous-integration-automated-web-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enterprise-dast-rfp-checklist-how-to-evaluate-dast-vendors</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enterprise-security-weekly-550-sven-morgenroth</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enterprise-security-weekly-557-ferruh-mavituna</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enterprise-security-weekly-572-sven-morgenroth</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enterprise-security-weekly-584-sven-morgenroth</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enterprise-security-weekly-81-ferruh-mavituna</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/enterprise-security-weekly-98-ferruh-mavituna</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ethical-hacking-vs-the-law-will-you-get-arrested-for-a-good-deed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/eu-ai-act-and-application-security-implications-requirements</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/exciting-growth-ahead-gerhard-watzinger-joins-invicti-as-chairman-of-the-board</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/executive-overconfidence-web-security-invicti-survey</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/exploiting-csrf-vulnerability-mongodb-rest-api</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/exploiting-insecure-exception-logging</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/exploiting-ssti-and-xss-in-cms-made-simple</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/exposing-public-ips-tor-services-through-ssl-certificates</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/extracting-data-from-insecure-elasticsearch-templates</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/facebook-cambridge-analytica-data-breach</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/false-negatives-accuracy-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/false-negatives-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/false-positives-the-dirty-secret-of-the-web-security-scanning-industry</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/false-positives-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/false-sense-of-security-in-the-cloud</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/fast-web-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/finding-exploiting-apache-struts-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/first-anniversary-biden-executive-order-cybersecurity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/fisma-update-whats-is-changing-and-why-it-matters</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/five-fundamental-tips-executive-appsec-buyin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/fixing-vulnerability-of-false-positives-before-dev-team-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/format-string-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/former-csos-prosecution-warning-to-prioritize-ethics-in-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/four-features-modern-appsec-curb-burnout</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/fragmented-sql-injection-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/frame-injection-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ftc-warns-remediate-log4j-vulnerabilities-or-face-consequences</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/future-of-application-security-invicti-and-kondukto-reshape-aspm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/future-of-cybersecurity-dast-solutions-sboms-apis-to-take-center-stage</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/future-proofing-devsecops-in-healthcare-with-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/gdpr-article-32-security-data-processing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/gdpr-compliance-2018-survey-results</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/generating-build-time-sboms-with-cyclonedx-and-invicti-aspm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/generative-ai-security-risks-and-opportunities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/get-management-buy-in-with-appsec-metrics</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/getting-real-on-ai-in-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/getting-results-not-noise-from-your-dast-solution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/getting-started-a-guide-to-becoming-a-product-security-engineer</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/getting-started-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/git-scm-affected-by-cve-2024-32002</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/github-action-tj-actions-changed-files-supply-chain-attack-what-we-have-learned</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/goodbye-xss-auditor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/google-cloud-affected-by-cve-2021-30476</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/google-increase-reward-vulnerability-program-xss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/grammarly-vulnerability-cloud-based-service</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/graphql-api-security-testing-introduction</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/hacking-smart-tv-command-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/hhs-guidelines-cybersecurity-in-healthcare</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/hipaa-compliance-checklist-for-application-security-teams</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-accurate-security-vulnerability-scanning-saves-money-visual-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-ai-creates-value-across-grc-opsec-appsec-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-ai-enhances-dast-on-invicti-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-ai-makes-cybersecurity-even-more-asymmetric</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-api-scanning-works</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-aspm-accelerates-remediation-faster-fixes-safer-apps</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-bad-is-missing-content-type-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-blind-sql-injection-works</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-dast-finds-zero-day-and-runtime-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-dast-supports-compliance-pci-dss-iso27001-hipaa-soc2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-dns-cache-poisoning-attacks-work</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-do-cisos-use-aspm-for-security-reporting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-equifax-data-breach-hack-happened</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-malicious-code-enters-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-should-enterprises-compare-api-security-approaches-at-scale</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-the-beast-attack-works</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-avoid-authentication-and-authorization-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-boost-sast-performance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-build-real-time-api-inventory</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-choose-an-api-security-scanner-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-choose-an-sca-tool</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-choose-api-security-solution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-choose-cloud-based-application-security-software-buyers-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-choose-dast-solution-evaluation-checklist</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-choose-penetration-testing-software</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-choose-right-application-security-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-detect-shadow-and-zombie-apis-automatically</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-evaluate-web-application-security-scanners-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-generate-and-audit-sbom-in-a-ci-cd-pipeline</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-get-developer-buy-in-for-appsec-programs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-implement-dast-effectively-guide-and-tips</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-integrate-continuous-api-fuzzing-into-cicd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-know-if-your-api-is-secure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-prevent-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-prevent-sql-injection-in-csharp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-prevent-sql-injection-in-php-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-prevent-xss-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-prevent-xss-in-java</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-prioritize-vulnerabilities-at-scale-in-enterprises</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-read-and-act-on-dast-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-run-vulnerability-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-secure-api-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-select-a-sast-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-select-dast-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-shift-left-better-with-git-hooks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-streamline-vulnerability-management</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-to-tell-apart-ssdlc-sdlc-sdl-security-life-cycle</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/how-web-shells-work</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/http-security-headers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/http-strict-transport-security-hsts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/http-strict-transport-security-hsts-358f5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/idor-everywhere-dangers-of-direct-object-references</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/impact-autocomplete-feature-web-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/impact-www-subdomain-cookie-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/importance-content-type-header-http-requests</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/importance-finding-all-web-application-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/importance-web-application-security-fedgov</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/improving-application-security-dast-could-mean-cheaper-cyberinsurance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/incident-recovery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/incident-response-steps-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/information-disclosure-issues-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/infosecurity-europe-tech-talk-automating-web-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/input-validation-errors-root-of-all-evil</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/insecure-deserialization-in-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/insecure-direct-object-reference-vulnerabilities-idor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/integer-overflow-errors</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/integrating-application-security-testing-development-analysts</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/integrating-appsec-into-ci-cd-workflows</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/integrating-dast-with-ci-cd-workflows</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/integrating-dast-with-jira-github-jenkins-other-dev-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/integrating-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/introducing-kntrl-enhancing-ci-cd-security-with-ebpf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/introducing-same-origin-policy-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/introducing-security-cookies-whitepaper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/introduction-digital-black-market-dark-web</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/investigating-cql-injection-apache-cassandra</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-a-challenger-in-2022-gartner-magic-quadrant-for-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-advisory-program-vulnerability-example</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-api-security-with-api-discovery-and-vulnerability-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-aspm-cli-in-ci-cd-pipelines</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-at-rsa-conference-2022-recap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-automated-dast-at-it-sa-expo-congress-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-helps-security-development-case-studies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-insights-black-hat-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-insights-getting-the-board-on-board-with-cybersecurity</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-insights-lessons-from-breaches-and-security-blunders</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-insights-squashing-appsec-urban-myths-and-legends</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-insights-women-in-engineering-change-the-game</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-shows-how-to-do-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/invicti-spring-2022-appsec-indicator-highlights-unrelenting-direct-impact-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/is-dast-only-for-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/is-log4shell-worst-software-vulnerability-ever</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/is-react-vulnerable-to-xss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/is-the-ciso-role-becoming-unsustainable-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/iso-27001-27002-changes-in-2022-application-security-vulnerability-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/iso-27001-application-security-must-start-with-secure-coding-practices</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/iso-27001-compliance-test-application-security-across-your-sdlc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/java-path-traversal-vulnerabilities-announcing-technical-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/javascript-scope-and-intensedebates-privacy-problems</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/joe-gillespie-interviewed-netsparker-enterprise-security-weekly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/json-web-token-jwt-attacks-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/json-web-token-jwt-security-sven-morgenroth-pauls-security-weekly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/keeping-web-applications-hipaa-compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/key-benefits-of-asoc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/key-trends-seriousness-cybersecurity-skills-gap</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/kntrl-integrates-open-policy-agent</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/latio-2026-application-security-market-report-the-move-to-outcome-driven-platforms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ldap-injection-how-to-prevent</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/learn-ebay-database-hack-attack</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/lessons-from-log4j-crisis-are-we-ready-for-next-global-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/leverage-browser-security-features-secure-website</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/linux-kernel-effected-by-cve-2023-2163</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/live-demo-web-application-firewall-bypass</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/local-file-inclusion-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/log4j-a-forcing-function-to-adopt-long-overdue-continuous-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/log4j-vulnerability-resource-center</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/logical-vs-technical-web-application-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/low-orbit-ion-cannon</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/making-automated-api-security-testing-a-reality-announcing-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/making-sense-of-appsec-vs-devsecops</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/man-in-the-middle-attack-how-avoid</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/max-out-your-developers-potential-with-relevant-security-training</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/meet-the-future-of-appsec-dast-first-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/meet-the-real-dast-more-than-a-checkbox</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/microsoft-azure-cli-affected-by-cve-2022-39327</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/microsoft-exchange-server-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/miercom-dast-benchmark-analysis-consistent-accuracy-beats-raw-scan-times</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/missing-function-level-access-control-vulnerability-maian-support-helpdesk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/missing-http-security-headers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/missing-x-frame-options-header</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/modern-appsec-kpis-from-scan-counts-to-risk-reduction-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/modern-dast-cybersecurity-visibility</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/monolithic-vs-microservices-architecture-which-is-better-for-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/more-testing-means-less-risk-invicti-spring-2023-appsec-indicator</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/most-common-security-vulnerabilities-predictions-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/moveit-transfer-breaches-perfect-storm-of-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/moveit-transfer-sql-injection-global-data-breaches</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/mssp-dast-advantage-strengthen-security-offerings-build-customer-loyalty</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/netsparker-scan-performance-upgrades</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/netsparker-web-security-scan-statistics-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/never-mind-the-buzzwords-straight-deal-on-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/never-trust-always-check-catching-partial-fixes-buggy-patches</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/never-trust-llms-announcing-prompt-injection-ebook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/new-cybersecurity-bills-bolster-communication-retain-talent</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/new-industry-study-70-percent-teams-skip-security-steps</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/new-nist-guidelines-for-vulnerability-assessment-and-disclosure-framework</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/new-pci-dss-3-compliance-explained</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/nis2-compliance-and-application-security-what-security-leaders-need-to-know</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/nist-csf-2-0-cybersecurity-framework-comes-of-age</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/noscript-vulnerability-tor-browser</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/okta-vulnerability-bcrypt-auth</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/online-vs-desktop-web-application-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/open-redirect-vulnerabilities-invicti-pauls-security-weekly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/open-redirection-vulnerability-information-prevention</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/openssl-3-0-0-3-0-6-vulnerabilities-less-heartbleed-more-paper-cut</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/oracle-weblogic-remote-code-execution-vulnerability-analysis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/osquery-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/our-perspective-on-project-glasswing-and-what-comes-next</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/owasp-api-security-top-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/owasp-api-security-top-10-2023-whats-missing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/owasp-api-security-top-10-demystified</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/owasp-asvs-web-development</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/owasp-top-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/owasp-top-10-2021-not-what-you-think</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/owasp-top-10-risks-llm-security-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/owasp-top-10-web-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/passwords-pass-phrases-ideological-divide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/passwords-pass-phrases-password-weaknesses</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/passwords-vs-pass-phrases-innovation-evolution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/paul-security-weekly-483-netsparker-ceo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/pauls-security-weekly-508-netsparker-hawk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/pci-approved-web-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/pci-data-security-standard-compliance-and-requirements-for-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/pci-dss-v4-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/penetration-testing-pricing-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/phishing-by-open-graph-protocol</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/php-stream-wrappers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/php-type-juggling-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/plan-web-application-vulnerability-detection-tests</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/polyfill-supply-chain-attack-when-your-cdn-goes-evil</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/poodle-attack-end-ssl-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/port-scanning-vs-vulnerability-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/predictive-risk-scoring</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/predictive-risk-scoring-is-the-way-for-appsec-ai</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/preventing-xss-ruby-on-rails-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/private-data-stolen-exploiting-css-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/privilege-escalation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/privileged-access-management-integration-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/proof-based-scanning-game-changer-reasons</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/proper-place-of-ai-tools-in-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/pros-cons-dns-over-https</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/protecting-apis-of-modern-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/protecting-apps-against-supply-chain-threats-invicti-aspm-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/protecting-website-using-anti-csrf-token</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/qa-web-application-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/quality-assurance-professionals-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/radio-waves-to-appsec-serialized-new-invicti-podcast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/rapid-reset-http2-vulnerability-when-streaming-leads-to-flooding</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/react2shell-critical-rce-in-react-rsc-next-js-cve-2025-55182-cve-2025-66478</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/real-time-insights-in-security-risk-management-why-they-matter</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/recipe-for-baking-application-security-into-cybersecurity-budget</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/red-hat-consulting-gitlab-breach</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/red-team-vs-blue-team</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/red-teaming-penetration-testing-difference</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/reddit-hack-teaches-web-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/reduce-dast-false-positives</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/reduce-security-debt-improve-security-posture</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/reflected-xss-attack</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/remote-code-evaluation-execution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/remote-file-inclusion-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/remote-hardware-takeover-via-vulnerable-admin-software</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/rest-api-web-service-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/rest-api-web-service-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/risk-based-vulnerability-management-rbvm-practical-guide</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/risks-of-vulnerability-management-only-for-compliance-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/risks-of-vulnerability-management-only-for-compliance-cisos-corner-e12d2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/robot-attack-revives-bleichenbacher-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/roi-of-dast-is-it-worth-the-investment</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/role-of-ai-in-application-security-banking-financial-services</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/role-of-web-application-security-in-protecting-iot</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ruby-affected-by-cve-2024-45409</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ruby-on-rails-security-basics</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/running-dast-in-ci-cd-for-regression-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/runtime-application-self-protection-rasp-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/same-site-cookie-attribute-prevent-cross-site-request-forgery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/same-site-cookies-by-default</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sans-cwe-top-25-dangerous-software-errors-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sans-webcast-unlocking-your-appsec-future</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sast-and-dast-tools-top-investment-considerations-for-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sast-dast-integration-why-combining-both-improves-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sast-vs-dast-compare-web-application-security-testing-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sast-vs-dast-vs-iast-everything-you-always-wanted-to-know</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/save-on-bug-bounties-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sbom-software-bill-of-materials</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sca-and-container-security-on-invicti-appsec-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/scaling-enterprise-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/scaling-up-automating-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/scanning-1000-web-applications-risky-business-podcast-interview-468</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/scapegoats-for-security-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/seasons-greetings</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/second-order-remote-file-inclusion-rfi</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/secure-coding-practices-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/secure-software-development-lifecycle-ssdlc-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/securing-ci-cd-runners-through-ebpf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/securing-third-party-code-for-iso-27001-compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/security-champions-and-devsecops-invicti-at-infosecurity-europe-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/security-logging-and-monitoring-failures-owasp-top-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/security-misconceptions-web-application-developers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/security-misconfigurations-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/security-tool-integration-secure-development-esg-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/security-training-for-developers</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/security-weekly-automation-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/security-weekly-ferruh-mavituna-scaling-up-automated-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sensitive-data-exposure-public-web-assets-hidden-threat</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sensorless-agentless-api-discovery-explained</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/separating-subdomains-from-third-party-hosted-www-domain</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/server-side-request-forgery-vulnerability-ssrf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/server-side-template-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/session-fixation-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/session-hijacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shadow-ai-risks-challenges-solutions-for</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shadow-and-zombie-apis-discovery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shadow-api-governance-policies-and-guardrails-for-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shadow-api-hidden-threat-to-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shadow-api-risks-how-to-regain-api-visibility</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shadow-vs-zombie-vs-rogue-apis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shai-hulud-2-worm-supply-chain-attack-on-npm-dependencies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shaping-future-devsecops-with-automated-security-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shared-hosting-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/shift-left-done-right-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/so-you-think-cross-site-scripting-xss-is-no-big-deal</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/soar-in-application-security-aspm-integration-is-the-future</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/soci-act-explained-compliance-rules-and-requirements</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/social-engineering-customer-facing-teams</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/social-hacking-social-engineering-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/software-and-data-integrity-failures-an-owasp-top-10-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/software-security-tops-enisa-cybersecurity-threats-list-2030</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/software-supply-chain-security-in-2023-after-solarwinds-log4j</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/solarwinds-hack-cybersecurity-lessons</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/solarwinds-sec-ciso-who-is-legally-responsible-for-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sound-hijacking-abusing-missing-xfo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/spelljacking-when-your-browser-is-too-helpful</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/splunk-enterprise-affected-by-cve-2023-40598</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sql-injection-cheat-sheet</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sql-injection-prevention-cheat-sheet</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sql-injection-ruby-on-rails-development</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sql-injection-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/sql-injection-vulnerability-history</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/ssrf-vulnerabilities-caused-by-sni-proxy-misconfigurations</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/state-of-the-devsecops-professional-invicti-survey</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/state-security-open-source-web-applications-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/stateful-api-scanning-why-context-matters</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/static-code-analysis</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/statistics-netsparker-advisories-web-application-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/stealing-local-files-with-simple-html-file</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/steam-entertainment-platform-gaming-vulnerable-xss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/stop-compromising-on-web-application-security-ebook</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/stop-noise-around-false-positives</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/strengthening-enterprise-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/string-concatenation-format-string-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/subresource-integrity-sri-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/successfully-integrating-security-sdlc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/supply-chain-risks-in-ai-driven-applications-securing-ai-integrations-and-dependencies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/supply-chain-security-snags</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/svn-digger-better-lists-for-forced-browsing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/system-hardening-for-your-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/tabnabbing-protection-bypass</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/test-xss-skills-vulnerable-sites</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/testing-saml-security-with-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/the-advantage-of-using-vex-sboms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/the-challenges-of-ensuring-iot-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/the-evolution-of-dast-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/the-heartbleed-bug</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/the-helix-files-choose-your-own-adventure</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/the-shadow-api-crisis-why-api-visibility-breaks-down-at-scale</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/threat-modeling</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/three-pillars-of-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/three-pillars-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/time-to-value-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/to-protect-against-ransomware-secure-your-entire-web-attack-surface</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-10-aspm-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-10-benefits-of-using-aspm-to-improve-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-10-cybersecurity-trends-to-look-out-for-in-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-10-mistakes-web-vulnerability-assessment</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-10-reasons-to-implement-an-aspm-right-now</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-5-application-security-misconfigurations</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-container-security-tools-ranked</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-dangerous-injection-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/top-resources-for-building-security-champions-program</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/transforming-self-xss-into-exploitable-xss</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/turning-security-product-into-solution-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/two-interesting-session-related-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/type-juggling-authentication-bypass-cms-made-simple</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/types-of-information-disclosure-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/types-of-penetration-tests</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/understanding-cookie-poisoning-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/understanding-javascript-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/understanding-reverse-shells</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/understanding-web-vulnerability-scanners</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/understanding-your-spring-4-shell-risk</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/unified-appsec-and-devops-platforms-the-shift-toward-integrated-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/untrusted-data-unserialize-php</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/unveiling-java-library-vulnerabilities-through-xxe-exploration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/upcoming-changes-in-nist-cybersecurity-framework-v2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/url-rewrite-rules-web-vulnerability-scanners</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/us-national-cybersecurity-strategy-five-pillars-to-bolster-software-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/using-google-bots-attack-vector</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/using-secure-software-development-frameworks-to-build-better-software</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vibe-coded-app-security-how-to-secure-ai-generated-applications-at-scale</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vibe-coding-promises-and-security-risks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/video-netsparker-4-minutes</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerabilities-cubecart-xss-csrf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerability-management-in-gitflow</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerability-management-vs-ad-hoc-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerability-scanner-dast-vs-siem</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerability-scanner-limitations</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerability-scanning-penetration-testing-differences</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerability-scanning-vs-penetration-testing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerable-and-outdated-components-owasp-top-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/vulnerable-web-applications-developers-target</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-automation-sdlc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-basics-keeping-software-up-to-date</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-best-practices</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-cost-cutting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-interview-security-weekly</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-misconceptions-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-scanners-detect-technical-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-testing-real-world</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-application-security-tests-included-in-functionality-qa-tests</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-asset-discovery-crucial-part-web-application-security-program</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-browser-address-bar-spoofing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-cache-poisoning-introduction</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-llm-attacks-securing-ai-powered-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-security-program-enterprise-security-weekly-164</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/web-security-testing-automate-the-repetitive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/webhook-security-best-practices</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/webraider</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/websocket-security-best-practices</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/weekly-security-roundup-week-01-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/weekly-security-roundup-week-02-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/weekly-security-roundup-week-04-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/weekly-security-roundup-week-05-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/weekly-security-roundup-week-52-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-are-the-5-maturity-levels-of-ai-pentesting</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-are-the-best-devsecops-friendly-application-security-platforms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-are-vulnerability-assessment-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-automation-means-in-application-scanning-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-government-agencies-need-to-know-about-cisas-new-binding-operational-directive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-a-linux-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-api-discovery</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-aspm-application-security-posture-management</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-best-vulnerability-scanning-tool</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-cnapp-cloud-native-application-protection-platform</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-devsecops</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-ethical-hacking</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-hipaa-vulnerability-management-and-how-do-you-address-security-gaps</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-nosql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-shadow-api-risks-and-real-world-examples</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-the-cause-of-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-the-digital-operational-resilience-act-dora</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-is-vulnerability-scanning-how-vulnerability-scanners-work</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-makes-invicti-iast-special</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-owasp-top-10-for-llm-applications-says-about-gen-ai-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-owasp-top-ten-2021-categories-mean</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-president-bidens-executive-order-means-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-to-know-about-cloud-workload-protection-platforms-cwpp</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-to-know-latest-biden-cybersecurity-memo</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-to-look-for-in-a-dast-solution</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/what-vulnerability-scanner-confirms-real-exploits</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/whats-coming-in-owasp-api-security-top-10-for-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/whats-the-deal-with-post-quantum-cryptography-pqc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-agentic-pentesting-needs-a-dast-foundation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-ai-generated-code-creates-hidden-security-debt</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-application-security-testing-orchestration-asto-is-a-need</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-authenticated-web-application-security-scans</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-business-critical-apps-need-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-curl-buffer-overflow-vulnerability-is-not-next-log4shell</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-dast-is-the-perfect-fit-for-agile-software-projects</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-dast-makes-the-perfect-security-posture-gauge</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-framework-choice-matters-in-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-incident-response-plans-crack-under-pressure-cisos-corner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-its-important-to-address-web-server-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-log4shell-vulnerability-will-never-become-yesterdays-news</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-penetration-testing-tools-dont-work-as-enterprise-scanners</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-sbom-matters-infographic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-static-and-dynamic-application-security-testing-tools-should-be-used-in-tandem</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-vibe-coding-is-a-dast-problem-not-just-a-sast-problem</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-you-need-dast-in-sdlc-announcing-invicti-white-paper</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/why-you-should-not-mark-heap-inspection-as-false-positive</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/will-autonomous-hacking-bots-change-cybersecurity-forever</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/winning-management-support-as-an-appsec-leader</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/wordpress-xss-rce-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/xml-rpc-protocol-ip-disclosure-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/xss-auditors</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/xss-filter-evasion</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/xss-filter-evasion-46faa</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/xss-vs-csrf-differences</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/xxe-xml-external-entity-attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/xxe-xml-external-entity-attacks-33023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/xz-utils-backdoor-supply-chain-rce-that-got-caught</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/zero-day-vulnerabilities-web-application-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/zero-trust-countdown-omb-memo-stresses-urgency-modern-appsec</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/web-security/zombie-shadow-api-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/analyzing-wordpress-hack-access-logs-with-notebooklm</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/brainstorm-tool-release-optimizing-web-fuzzing-with-local-llms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/cache-bypass-techniques-for-time-based-sql-injection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/first-tokens-the-achilles-heel-of-llms</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/invicti-platform-launch-research-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/llm-tool-usage-security</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/next-js-middleware-bypass-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/security-issues-in-vibe-coded-web-apps-analyzed</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/security-research-in-the-age-of-ai-tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/system-prompt-exposure-how-ai-image-generators-may-leak-sensitive-instructions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/security-labs/xss-ducks-dinosaurs-why-a-little-security-knowledge-is-dangerous</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/2017-june-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/amazon-waf-rule-generation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/api-support-discovery-service</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/april-2016-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/april-2016-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/april-2017-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/august-2017-netsparker-desktop-release</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/authenticated-vulnerability-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/automate-more-pre-web-security-scan-tasks-new-netsparker-web-security-scanners</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/automatic-optimized-web-security-scan-policies-efficient-scans</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/automatic-url-rewrite-rules-configuration-web-security-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/better-coverage-web-security-scan-single-page-applications-spa</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/breach-attack-security-check</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/cannot-login-website-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/capture-http-requests-responses-web-security-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/cloudflare-waf-rule-generation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configure-verify-web-form-authentication-netsparker-cloud</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-active-directory-federation-services-single-sign-on-integration-with-saml</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-azure-active-directory-single-sign-on-integration-with-saml</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-basic-digest-ntlm-kerberos-authentication-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-google-single-sign-on-integration-with-saml</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-managing-scan-policies-netsparker-cloud</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-managing-scan-profiles-netsparker-desktop</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-okta-single-sign-on-integration-with-saml</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-pingidentity-single-sign-on-integration-with-saml</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-saml-based-single-sign-on-integration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/configuring-slack-integration-with-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/controlled-web-security-scan-netsparker-desktop-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/creating-new-sendto-action</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/custom-report-policies-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/custom-reporting-api</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/cvss-3-1-support</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/december-2016-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/december-2017-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/december-2018-netsparker-standard-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/december-2019-update-netsparker-enterprise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/difference-between-netsparker-desktop-professional-standard-editions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/drupal-security-top-tips-to-secure-your-drupal-application</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/easy-authenticated-scanning-invicti-custom-script-editor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/efficient-precise-web-security-scans-with-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/email-reports-attachments-following-scans</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/enable-two-factor-authentication-netsparker-enterprise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/exclude-include-links-scan-sitemap-after-crawling</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/exclude-parameters-web-security-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/exclude-parts-website-from-web-application-security-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/expand-force-browsing-resource-finder</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/export-netsparker-web-security-scan-web-application-firewall-rules</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/february-2018-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/fingerprinting-off-the-shelf-web-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/fix-vulnerabilities-faster-bidirectional-invicti-jira-integration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/form-authentication-otp-support</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/form-authentication-password-protected-websites-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/form-validation-errors-knowledge-base</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/fortiweb-waf-rule-generation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/freshservice-send-to-integration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/generate-modsecurity-web-application-firewall-rules</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/heuristic-url-rewriting-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/how-invicti-finds-vulnerabilities-heuristics</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/how-to-configure-url-rewrite-rules-in-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/how-to-install-configure-netsparker-cloud-scan-bamboo-plugin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/how-to-install-configure-netsparker-cloud-scan-jenkins-plugin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/how-to-install-configure-netsparker-cloud-scan-teamcity-plugin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/http-request-builder-penetration-testing-tool</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/hunting-down-vulnerabilities-invicti-dast-iast-approach</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/imperva-securesphere-waf-rule-generation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/improved-crawling-support-for-single-page-applications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/incorporate-business-logic-get-the-best-out-of-dast</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/integrate-netsparker-vulnerability-management-software</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/integrate-netsparker-web-security-scanner-bug-tracking-system</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/integrating-netsparker-cloud-issue-tracking-system</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/integrating-netsparker-desktop-gocd</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/integrating-netsparker-jenkins</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/integrating-netsparker-software-development-lifecycle-sdlc</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/integration-sync-scan-data-netsparker</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-adds-iast-support-nodejs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-compliance-reports-overview</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-defectdojo-integration-improve-vulnerability-remediation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-achieves-wcag-2-1-accessibility-compliance</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-april-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-february-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-ondemand-august-2022-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-ondemand-september-2022-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-august-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-august-2021-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-december-2021-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-january-2021-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-january-2023-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-june-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-june-2021-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-may-2022-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-october-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-enterprise-onpremises-october-2022-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-helps-manage-teams-permissions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-improves-discovery-service-and-integrations</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-reports-inform-vulnerability-management</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-standard-december-2021-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-standard-january-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-standard-january-2021-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-standard-july-2021-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-standard-march-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-standard-may-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-standard-september-2020-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/invicti-terminates-support-for-tls-1-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/ip-restrictions-settings</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/january-2017-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/january-2017-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/january-2019-netsparker-enterprise-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/january-2020-update-invicti-enterprise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/javascript-library-framework-fingerprint-version-detection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/july-2016-netsparker-cloud-update-rest-sri-reports</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/june-2016-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/june-2019-netsparker-enterprise-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/knowledge-base-benefits</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/manual-crawling-web-security-scanner-proxy-mode</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/march-2017-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/march-2019-netsparker-standard-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/mattermost-integration-invicti-enterprise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/may-2016-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/may-2016-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/may-2018-netsparker-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/move-backup-netsparker-desktop-license</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-3-1-4-released-download</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-3-1-7-pci-dss-version-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-3-1-released-features-overview</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-3-1-web-application-security-scanner-released</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-3-2-soap-web-services-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-3-5-features-highlight</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-3-new-features-highlights</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-4-1-new-security-checks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-4-google-web-toolkit-automatic-form-authentication</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-cloud-features-highlight</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-cloud-reports-reporting-tool</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-cloud-update-drown-ssl-tls-new-security-checks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-cloud-users-permissions-configuration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-cloud-web-vulnerability-tracking-system</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-desktop-command-line-interface-arguments</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-desktop-july-2016-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-desktop-update-4-5-8-10229-drown-ssl-tls</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-hawk-detects-ssrf-out-of-band-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-knowledge-base-nodes</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-licensing</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-scan-policies-feature-highlight-video</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-scan-policy-editor</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-standard-november-2019-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-standard-seats</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-standard-september-2019-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/netsparker-terminates-support-for-tls-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/new-pci-dss-3-2-data-security-standard</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/new-scan-search-feature</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/november-2016-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/november-2016-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/november-2017-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/october-2016-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/october-2016-netsparker-desktop-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/optimize-netsparker-scan-policies-efficient-web-application-security-scans</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/poodle-ssl-vulnerability</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/progress-panel-improvements</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/proof-based-web-application-security-scanning</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/recover-unexpectedly-terminated-web-security-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/restrict-web-security-scan-specific-time</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/sample-xml-report-vulnerability-mapping-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/sans-top25-report</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/scan-fix-mongodb-injection-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/scan-for-heartbleed-ssl-vulnerability-netsparker-vulnerability-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/scan-multiple-websites-simultaneously-netsparker-standard</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/scan-settings-netsparker-enterprise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/scan-time-window-web-security-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/scan-website-vulnerabilities-socks-proxy</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/scanning-parameter-based-navigation-websites-vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/scanning-websites-linked-to-from-target</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/selenium-netsparker-manual-crawling-web-applications-scanner</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/send-web-security-reports-email-automatic-scheduled-scan</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/september-2016-netsparker-cloud-improved-users-permissions-vulnerability-tracking-system</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/september-2017-netsparker-cloud-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/september-2018-netsparker-enterprise-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/september-2018-netsparker-update</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/september-2019-update-netsparker-enterprise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/single-sign-on-support</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/streamline-application-security-testing-invicti-scan-agents</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/streamline-authenticated-scanning-invicti-verifier-agents</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/streamline-management-invicti-servicenow-vulnerability-response-integration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/tailoring-web-security-scan-reports-organization-security-policies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/timthumb-vulnerability-wordpress-plugins-themes</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/triggering-netsparker-remotely-windows-management-instrumentation</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/troubleshooting-inconsistent-web-security-scan-results</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/universal-2nd-factor-authentication</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/upcoming-changes-invicti-teams-permissions</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/upgrade-netsparker-standard-professional</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/vulnerability-scan-rest-api-web-service-automatic</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/vulnerability-scanning-privileged-access-management-zero-trust-environments</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/vulnerability-severities-explained</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/waf-identifier-security-check</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/web-application-security-scanner-email-sms-notifications</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/web-technology-detection-fingerprinting-invicti</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/web-vulnerability-scanner-coverage-checks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/website-groups-netsparker-enterprise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/windows-short-8-3-filenames-web-security-problem</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/wordpress-default-admin-account</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/wordpress-security-tips-secure-debug-logs</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/wordpress-security-wpadmin-directory</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/working-custom-security-checks-invicti-enterprise</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/docs-and-faqs/youtrack-sendto-integration</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn-categories/attacks</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn-categories/protection</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn-categories/tools</loc>
    </url>
<url>
        <loc>https://www.invicti.com/learn-categories/vulnerabilities</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/1-apr-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/1-jul-2021-v6-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/1-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/1-nov-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/10-jul-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-apr-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-apr-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-feb-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-jan-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-july-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-may-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-may-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-may-2018-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-may-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-may-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-oct-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/11-oct-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/12-aug-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/12-aug-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/12-dec-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/12-jan-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/12-mar-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/12-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/12-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/12-sep-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-apr-2022-v2-2-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-dec-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-december-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-jul-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-jul-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-oct-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-october-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-sep-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/13-sep-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-dec-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-dec-2021-v6-2-1-33642</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-feb-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-feb-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-feb-2022-v6-3-3-34686</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-jun-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-jun-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-jun-2022-v6-6-0-36485</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-may-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-may-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/14-october-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/15-dec-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/15-dec-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/15-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/15-jun-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/15-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/15-may-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/15-sep-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/15-sep-2022-v6-7-1-37730</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/16-aug-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/16-feb-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/16-jan-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/16-jun-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/16-mar-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/16-march-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/16-nov-2021-v6-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-feb-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-jan-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-jan-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-jan-2023-v23-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-january-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-may-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-nov-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/17-oct-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-apr-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-aug-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-dec-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-dec-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-jan-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-jan-2016-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-11</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-12</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-13</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-14</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-15</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-16</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-17</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-18</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-19</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-20</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-21</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-22</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-23</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-24</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-25</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-26</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-27</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-28</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-29</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-30</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-31</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-32</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-33</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-34</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-35</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-36</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-37</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-38</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-39</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-40</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-6</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-8</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-mar-2015-9</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-may-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-may-2015-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-may-2015-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-may-2015-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/18-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-apr-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-aug-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-aug-2021-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-dec-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-jul-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-jul-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-jul-2022-v2-3-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-jul-2022-v6-6-1-36926</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-july-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-oct-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-sep-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19-sep-2018-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/19th-july-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-dec-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-dec-2021-v2-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-feb-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-jan-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-jul-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-jul-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/2-oct-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/20-feb-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/20-feb-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/20-jan-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/20-jan-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/20-jan-2022-v6-3-2-34187</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/20-jul-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/20-jun-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/20-may-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-dec-2021-v2-2-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-december-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-jul-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-jun-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-june-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-nov-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/21-sep-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-11-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-12-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-dec-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-dec-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-february-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-jun-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-jun-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-mar-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-nov-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-november-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-sep-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/22-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/23-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/23-apr-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/23-dec-2021-v6-3-033782</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/23-jan-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/23-jul-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/23-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/23-may-2022-v2-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/23-may-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/24-april-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/24-aug-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/24-feb-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/24-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/24-nov-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/24-sep-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/25-feb-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/25-jul-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/25-jun-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/25-mar-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/25-may-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/25-oct-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/25-oct-2022-v2-4-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/25-october-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-apr-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-aug-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-feb-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-jan-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-jul-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-jun-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-jun-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-nov-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-october-2023-v23-10-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/26-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/27-jan-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/27-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/27-sep-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-apr-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-apr-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-apr-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-dec-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-dec-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-february-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-jun-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-mar-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-march-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-oct-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/28-september-2023-v23-9-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/29-apr-2022-v6-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/29-dec-2021-v6-3-1-33855</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/29-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/29-jan-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/29-jun-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/29-may-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/29-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/29-nov-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/3-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/3-mar-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/3-may-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/3-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/3-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/30-jun-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/30-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/30-nov-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/30-sep-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/30-sep-2019-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/30-sep-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/31-aug-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/31-aug-2022-v6-7-0-37625</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/31-dec-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/31-dec-2018-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/31-jan-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/31-january-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/31-july-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/4-apr-2022-v6-4-3-35616</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/4-jul-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/4-jun-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/4-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/4-may-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/5-feb-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/5-jan-2022-v2-2-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/5-may-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/5-may-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/5-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-8-0-38168</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-apr-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-apr-2015-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-apr-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-apr-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-feb-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-jul-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-mar-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-nov-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-oct-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-oct-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/6-september-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/7-apr-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/7-apr-2021-v6-0-2-30446</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/7-december-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/7-jun-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/7-jun-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/7-june-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/7-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-apr-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-apr-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-dec-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-feb-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-feb-2017-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-jun-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-mar-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-mar-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-mar-2022-v6-4-0-35166</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-may-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-may-2019-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/8-november-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-apr-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-aug-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-feb-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-jul-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-mar-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-mar-2015-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-nov-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-nov-2022-v2-4-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-oct-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/9-sep-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/iec-v24-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/ieop-v24-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/is-v24-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-10-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-10-0-42447</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-10-1-31-october-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-11-0-16-november-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-11-0-42728</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-11-1-29-november-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-12-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-12-0-13-december-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-12-0-8-december-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-12-1-19-december-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-2-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-2-0-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-2-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-3-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-3-0-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-4-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-4-0-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-5-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-5-0-40516</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-6-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-6-0-40861</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-7-0-41392</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-8-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-8-0-41692</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-8-0-41720</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-9-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-9-0-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelog/v23-9-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars-thank-you/dast-to-sast-correlation-thank-you</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars-thank-you/shadow-ai-appsec-strategies</loc>
    </url>
<url>
        <loc>https://www.invicti.com/webinars-thank-you/shadow-api-find-test-fix</loc>
    </url>
<url>
        <loc>https://www.invicti.com/partners-webinars/accelerate-series</loc>
    </url>
<url>
        <loc>https://www.invicti.com/partners-webinars/invicti-accelerate-series-december2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/partners-webinars/invicti-accelerate-series-february2026</loc>
    </url>
<url>
        <loc>https://www.invicti.com/partners-webinars/invicti-accelerate-series-october2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/events/netsparker-rsa-conference-2014</loc>
    </url>
<url>
        <loc>https://www.invicti.com/blog/events/picking-up-clear-signal-owasp-2023-global-appsec-dublin</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/11-jan-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/11-may-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/11-may-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/12-aug-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/12-dec-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/12-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/13-december-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/13-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/13-jul-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/13-oct-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/13-october-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/14-feb-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/14-october-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/15-dec-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/15-jun-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/15-sep-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/16-aug-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/16-march-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/17-january-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/17-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/17-nov-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/18-aug-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/19-apr-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/19-aug-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/19-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/19-jul-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/19-july-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/19-oct-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/20-jan-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/20-jul-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/20-jun-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/20-may-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/21-december-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/21-june-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/21-sep-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/22-dec-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/22-february-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/22-mar-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/22-november-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/23-may-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/24-april-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/24-feb-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/24-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/25-october-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/26-aug-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/26-feb-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/27-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/27-sep-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/28-apr-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/28-apr-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/28-february-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/28-jun-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/28-march-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/28-september-2023-v23-9-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/29-jun-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/30-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/30-nov-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/31-aug-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/31-january-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/31-july-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/4-mar-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/6-apr-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/6-jul-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/6-oct-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/6-september-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/7-december-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/7-jun-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/7-june-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/8-apr-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/8-dec-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/8-mar-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/8-november-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/9-aug-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/9-feb-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/9-nov-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/9-sep-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-10-0-8-october-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-10-1-30-october-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-2-0-20-february-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-3-0-12-march-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-3-1-28-march-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-4-0-17-april-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-5-0-7-may-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-5-1-28-may-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-6-0-13-june-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-7-0-09-july-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-8-0-13-august-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/iec-v24-8-1-27-august-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v23-10-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v23-10-1-31-october-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v23-11-0-16-november-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v23-11-1-29-november-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v23-12-0-13-december-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v23-2-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v23-8-0-41692</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-1-1-iec-30-january-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-11-0-12-november-2024-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-12-0-iec-3-december-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-12-1-hf-mend-12-december-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-12-1-iec-12-december-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-5-2-4-june-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-5-3-11-june-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-6-1-20-june-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-7-1-17-july-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-7-2-25-july-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-7-4-5-august-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-8-2-29-august-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-9-0-10-iec-september-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v24-9-1-24-iec-september-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-1-0-iec-14-january-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-1-1-iec-28-january-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-1-2-hf-30-january-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-10-0-iec-14-october-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-10-1-27-october-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-11-0-iec-11-november-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-11-1-hf-iec-20-november-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-11-1-iec-19-november-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-2-0-iec-13-february-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-2-1-25-february-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-3-0-11-march-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-3-1-3-april-2025-api-hub-hotfix</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-3-1-iec-25-march-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-4-0-iec-8-april-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-4-1-24-april-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-5-0-iec-6-may-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-5-1-iec-27-may-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-6-0-iec-18-june-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-7-0-hf-21-july-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-7-0-iec-8-july-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-7-1-iec-29-july-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-8-0-12-august-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-8-1-26-august-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-9-0-9-september-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-demand/v25-9-1-23-september-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/1-apr-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/11-apr-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/11-july-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/12-aug-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/13-apr-2022-v2-2-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/13-sep-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/14-dec-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/14-jun-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/14-may-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/15-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/15-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/17-feb-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/17-jan-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/17-jan-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/17-jan-2023-v23-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/17-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/17-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/18-apr-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/18-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/18-jan-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/18-jan-2016-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/19-aug-2021-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/19-jul-2022-v2-3-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/19-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/19-sep-2018-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/2-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/2-dec-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/2-dec-2021-v2-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/2-jul-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/2-oct-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/20-feb-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/21-dec-2021-v2-2-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/21-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/21-jul-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/22-jun-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/22-sep-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/23-jul-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/23-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/23-may-2022-v2-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/24-6-0-27-june-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/25-feb-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/25-jul-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/25-jun-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/25-oct-2022-v2-4-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/26-jan-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/26-jun-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/26-nov-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/26-october-2023-v23-10-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/26-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/28-apr-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/28-oct-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/29-jan-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/29-may-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/29-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/3-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/31-jan-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/4-jul-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/4-may-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/5-feb-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/5-jan-2022-v2-2-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/5-may-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/6-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/6-mar-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/7-apr-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/7-jun-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/9-nov-2022-v2-4-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/ieop-v24-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-12-0-8-december-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-12-1-19-december-2023</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-2-0-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-3-0-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-4-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-5-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-6-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-8-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v23-9-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-10-0-17-september-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-11-0-18-november-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-12-0-17-december-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-12-1-26-december-2024-hf</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-2-0-6-february-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-3-0-14-march-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-5-0-23-may-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-7-0-24-july-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-7-1-9-august-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-8-0-26-august-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v24-9-0-10-september-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v25-1-0-29-january-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v25-11-0-26-november-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v25-2-0-26-february-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v25-3-0-25-march-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v25-4-0-iec-22-april-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v25-5-0-22-may-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v25-7-0-ieop-29-july-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-enterprise-on-premises/v25-9-1-27-october-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/1-jul-2021-v6-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/1-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/1-nov-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/10-jul-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/11-apr-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/11-feb-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/11-may-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/11-may-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/11-may-2018-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/11-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/11-oct-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/11-oct-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/12-jan-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/12-mar-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/12-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/12-sep-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/13-dec-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/13-jul-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/13-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/13-sep-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/14-dec-2021-v6-2-1-33642</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/14-feb-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/14-feb-2022-v6-3-3-34686</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/14-jun-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/14-jun-2022-v6-6-0-36485</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/14-may-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/15-dec-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/15-may-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/15-sep-2022-v6-7-1-37730</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/16-feb-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/16-jan-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/16-jun-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/16-mar-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/16-nov-2021-v6-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/17-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/17-may-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/17-oct-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-dec-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-dec-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-10</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-11</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-12</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-13</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-14</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-15</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-16</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-17</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-18</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-19</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-20</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-21</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-22</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-23</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-24</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-25</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-26</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-27</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-28</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-29</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-30</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-31</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-32</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-33</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-34</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-35</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-36</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-37</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-38</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-39</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-40</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-6</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-7</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-8</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-mar-2015-9</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-may-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-may-2015-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-may-2015-3</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-may-2015-4</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/18-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/19-dec-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/19-jul-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/19-jul-2022-v6-6-1-36926</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/19-sep-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/19th-july-2022</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/2-feb-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/2-jan-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/2-jul-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/2-nov-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/20-feb-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/20-jan-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/20-jan-2022-v6-3-2-34187</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/21-jun-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/21-nov-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/21-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/22-11-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/22-12-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/22-dec-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/22-jun-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/22-nov-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/22-sep-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/23-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/23-apr-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/23-dec-2021-v6-3-033782</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/23-jan-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/24-aug-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/24-nov-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/24-sep-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/25-mar-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/25-may-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/25-oct-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/26-apr-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/26-jul-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/26-jun-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/27-jan-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/28-dec-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/28-dec-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/28-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/28-jan-2021</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/28-mar-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/29-apr-2022-v6-5</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/29-dec-2021-v6-3-1-33855</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/29-jan-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/29-nov-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/3-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/3-mar-2016-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/3-may-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/3-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/30-jun-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/30-sep-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/30-sep-2019-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/30-sep-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/31-aug-2022-v6-7-0-37625</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/31-dec-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/31-dec-2018-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/4-apr-2022-v6-4-3-35616</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/4-jun-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/5-may-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/5-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/6-8-0-38168</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/6-apr-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/6-apr-2015-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/6-apr-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/6-feb-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/6-nov-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/6-oct-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/7-apr-2021-v6-0-2-30446</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/7-oct-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/8-apr-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/8-feb-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/8-feb-2017-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/8-jun-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/8-mar-2018</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/8-mar-2022-v6-4-0-35166</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/8-may-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/8-may-2019-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/9-apr-2020</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/9-jul-2019</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/9-mar-2015</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/9-mar-2015-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/9-mar-2016</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/9-oct-2017</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-1-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-10-1-30-october-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-2-0-20-february-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-3-1-28-march-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-4-0-17-april-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-5-0-7-may-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-5-1-28-may-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-6-0-13-june-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/is-v24-8-0-13-august-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-10-0-42447</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-11-0-42728</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-12-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-2-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-3-0</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-4-0-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-5-0-40516</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-6-0-40861</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-7-0-41392</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-8-0-41720</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-9-0-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v23-9-1</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-1-1-30-january-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-10-0-8-october-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-11-0-12-november-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-12-0-3-december-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-12-1-is-12-december-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-3-0-12-march-2024-2</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-7-0-09-july-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-7-1-25-july-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-8-1-27-august-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-9-0-10-is-september-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v24-9-1-24-september-2024</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-1-0-is-14-january-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-1-1-28-january-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-10-0-14-october-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-11-0-11-november-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-2-0-is-13-february-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-2-1-is-25-february-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-3-0-25-is-february-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-4-0-is-8-april-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-5-0-is-6-may-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-5-1-27-may-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-6-0-is-18-june-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-7-0-8-july-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-standard/v25-8-0-13-august-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-application-security-platform/11-september-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-application-security-platform/14-august-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-application-security-platform/28-august-2025</loc>
    </url>
<url>
        <loc>https://www.invicti.com/changelogs/invicti-application-security-platform/30-july-2025</loc>
    </url>
    <url>
        <loc>https://www.invicti.com/use-cases/csrf-scanner</loc>
    </url>
</urlset>