<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>
  <url>
    <loc>https://invaders.ie/resources/blog/cloud-and-application-security/litellm-sql-injection-flaw-puts-ai-gateways-on-the-front-line</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T08:06:47.672Z</news:publication_date>
      <news:title>LiteLLM SQL injection flaw puts AI gateways on the front line</news:title>
      <news:keywords>LiteLLM SQL injection, CVE-2026-42208, AI gateway security, LiteLLM proxy vulnerability, KEV exploited AI proxy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/vulnerability/dirty-frag-linux-kernel-zero-day-gives-local-users-a-fast-path-to-root</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T08:04:36.628Z</news:publication_date>
      <news:title>Dirty Frag Linux kernel zero-day gives local users a fast path to root</news:title>
      <news:keywords>Dirty Frag Linux kernel, Linux local privilege escalation zero day, Dirty Frag root exploit, Linux kernel esp4 esp6 rxrpc mitigation, Dirty Frag Copy Fail successor</news:keywords>
    </news:news>
  </url>
</urlset>