<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://blog.pentestnepal.tech/cwe/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1004-sensitive-cookie-without-httponly-flag/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1007-insufficient-visual-distinction-of-homoglyphs-presented-to-user/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/102-struts-duplicate-validation-forms/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1021-improper-restriction-of-rendered-ui-layers-or-frames/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1022-use-of-web-link-to-untrusted-target-with-window-opener-access/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1023-incomplete-comparison-with-missing-factors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1024-comparison-of-incompatible-types/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1025-comparison-using-wrong-factors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/103-struts-incomplete-validate-method-definition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1037-processor-optimization-removal-or-modification-of-security-critical-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1038-insecure-automated-optimizations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1039-inadequate-detection-or-handling-of-adversarial-input-perturbations-in-automated/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/104-struts-form-bean-does-not-extend-validation-class/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1041-use-of-redundant-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1042-static-member-data-element-outside-of-a-singleton-class-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1043-data-element-aggregating-an-excessively-large-number-of-non-primitive-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1044-architecture-with-number-of-horizontal-layers-outside-of-expected-range/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1045-parent-class-with-a-virtual-destructor-and-a-child-class-without-a-virtual-destr/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1046-creation-of-immutable-text-using-string-concatenation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1047-modules-with-circular-dependencies/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1048-invokable-control-element-with-large-number-of-outward-calls/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1049-excessive-data-query-operations-in-a-large-data-table/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/105-struts-form-field-without-validator/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1050-excessive-platform-resource-consumption-within-a-loop/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1051-initialization-with-hard-coded-network-resource-configuration-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1052-excessive-use-of-hard-coded-literals-in-initialization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1053-missing-documentation-for-design/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1054-invocation-of-a-control-element-at-an-unnecessarily-deep-horizontal-layer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1055-multiple-inheritance-from-concrete-classes/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1056-invokable-control-element-with-variadic-parameters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1057-data-access-operations-outside-of-expected-data-manager-component/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1058-invokable-control-element-in-multi-thread-context-with-non-final-static-storable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1059-insufficient-technical-documentation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/106-struts-plug-in-framework-not-in-use/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1060-excessive-number-of-inefficient-server-side-data-accesses/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1061-insufficient-encapsulation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1062-parent-class-with-references-to-child-class/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1063-creation-of-class-instance-within-a-static-code-block/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1064-invokable-control-element-with-signature-containing-an-excessive-number-of-param/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1065-runtime-resource-management-control-element-in-a-component-built-to-run-on-appli/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1066-missing-serialization-control-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1067-excessive-execution-of-sequential-searches-of-data-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1068-inconsistency-between-implementation-and-documented-design/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1069-empty-exception-block/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/107-struts-unused-validation-form/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1070-serializable-data-element-containing-non-serializable-item-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1071-empty-code-block/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1072-data-resource-access-without-use-of-connection-pooling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1073-non-sql-invokable-control-element-with-excessive-number-of-data-resource-accesse/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1074-class-with-excessively-deep-inheritance/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1075-unconditional-control-flow-transfer-outside-of-switch-block/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1076-insufficient-adherence-to-expected-conventions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1077-floating-point-comparison-with-incorrect-operator/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1078-inappropriate-source-code-style-or-formatting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1079-parent-class-without-virtual-destructor-method/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/108-struts-unvalidated-action-form/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1080-source-code-file-with-excessive-number-of-lines-of-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1082-class-instance-self-destruction-control-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1083-data-access-from-outside-expected-data-manager-component/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1084-invokable-control-element-with-excessive-file-or-data-access-operations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1085-invokable-control-element-with-excessive-volume-of-commented-out-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1086-class-with-excessive-number-of-child-classes/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1087-class-with-virtual-method-without-a-virtual-destructor/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1088-synchronous-access-of-remote-resource-without-timeout/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1089-large-data-table-with-excessive-number-of-indices/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/109-struts-validator-turned-off/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1090-method-containing-access-of-a-member-element-from-another-class/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1091-use-of-object-without-invoking-destructor-method/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1092-use-of-same-invokable-control-element-in-multiple-architectural-layers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1093-excessively-complex-data-representation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1094-excessive-index-range-scan-for-a-data-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1095-loop-condition-value-update-within-the-loop/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1096-singleton-class-instance-creation-without-proper-locking-or-synchronization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1097-persistent-storable-data-element-without-associated-comparison-control-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1098-data-element-containing-pointer-item-without-proper-copy-control-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1099-inconsistent-naming-conventions-for-identifiers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/11-asp-net-misconfiguration-creating-debug-binary/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/110-struts-validator-without-form-field/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1100-insufficient-isolation-of-system-dependent-functions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1101-reliance-on-runtime-component-in-generated-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1102-reliance-on-machine-dependent-data-representation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1103-use-of-platform-dependent-third-party-components/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1104-use-of-unmaintained-third-party-components/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1105-insufficient-encapsulation-of-machine-dependent-functionality/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1106-insufficient-use-of-symbolic-constants/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1107-insufficient-isolation-of-symbolic-constant-definitions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1108-excessive-reliance-on-global-variables/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1109-use-of-same-variable-for-multiple-purposes/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/111-direct-use-of-unsafe-jni/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1110-incomplete-design-documentation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1111-incomplete-i-o-documentation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1112-incomplete-documentation-of-program-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1113-inappropriate-comment-style/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1114-inappropriate-whitespace-style/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1115-source-code-element-without-standard-prologue/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1116-inaccurate-source-code-comments/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1117-callable-with-insufficient-behavioral-summary/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1118-insufficient-documentation-of-error-handling-techniques/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1119-excessive-use-of-unconditional-branching/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/112-missing-xml-validation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1120-excessive-code-complexity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1121-excessive-mccabe-cyclomatic-complexity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1122-excessive-halstead-complexity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1123-excessive-use-of-self-modifying-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1124-excessively-deep-nesting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1125-excessive-attack-surface/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1126-declaration-of-variable-with-unnecessarily-wide-scope/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1127-compilation-with-insufficient-warnings-or-errors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/113-improper-neutralization-of-crlf-sequences-in-http-headers-http-request-response-/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/114-process-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/115-misinterpretation-of-input/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/116-improper-encoding-or-escaping-of-output/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1164-irrelevant-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/117-improper-output-neutralization-for-logs/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1173-improper-use-of-validation-framework/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1174-asp-net-misconfiguration-improper-model-validation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1176-inefficient-cpu-computation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1177-use-of-prohibited-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/118-incorrect-access-of-indexable-resource-range-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1188-initialization-of-a-resource-with-an-insecure-default/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1189-improper-isolation-of-shared-resources-on-system-on-a-chip-soc/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1190-dma-device-enabled-too-early-in-boot-phase/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1191-on-chip-debug-and-test-interface-with-improper-access-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1192-improper-identifier-for-ip-block-used-in-system-on-chip-soc/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1193-power-on-of-untrusted-execution-core-before-enabling-fabric-access-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/12-asp-net-misconfiguration-missing-custom-error-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1204-generation-of-weak-initialization-vector-iv/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1209-failure-to-disable-reserved-bits/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/121-stack-based-buffer-overflow/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/122-heap-based-buffer-overflow/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1220-insufficient-granularity-of-access-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1221-incorrect-register-defaults-or-module-parameters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1222-insufficient-granularity-of-address-regions-protected-by-register-locks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1223-race-condition-for-write-once-attributes/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1224-improper-restriction-of-write-once-bit-fields/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1229-creation-of-emergent-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/123-write-what-where-condition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1230-exposure-of-sensitive-information-through-metadata/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1231-improper-prevention-of-lock-bit-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1232-improper-lock-behavior-after-power-state-transition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1233-security-sensitive-hardware-controls-with-missing-lock-bit-protection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1234-hardware-internal-or-debug-modes-allow-override-of-locks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1235-incorrect-use-of-autoboxing-and-unboxing-for-performance-critical-operations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1236-improper-neutralization-of-formula-elements-in-a-csv-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1239-improper-zeroization-of-hardware-register/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/124-buffer-underwrite-buffer-underflow/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1240-use-of-a-cryptographic-primitive-with-a-risky-implementation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1241-use-of-predictable-algorithm-in-random-number-generator/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1242-inclusion-of-undocumented-features-or-chicken-bits/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1243-sensitive-non-volatile-information-not-protected-during-debug/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1244-internal-asset-exposed-to-unsafe-debug-access-level-or-state/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1245-improper-finite-state-machines-fsms-in-hardware-logic/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1246-improper-write-handling-in-limited-write-non-volatile-memories/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1247-improper-protection-against-voltage-and-clock-glitches/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1248-semiconductor-defects-in-hardware-logic-with-security-sensitive-implications/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1249-application-level-admin-tool-with-inconsistent-view-of-underlying-operating-syst/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/125-out-of-bounds-read/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1250-improper-preservation-of-consistency-between-independent-representations-of-shar/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1251-mirrored-regions-with-different-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1252-cpu-hardware-not-configured-to-support-exclusivity-of-write-and-execute-operatio/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1253-incorrect-selection-of-fuse-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1254-incorrect-comparison-logic-granularity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1255-comparison-logic-is-vulnerable-to-power-side-channel-attacks/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1256-improper-restriction-of-software-interfaces-to-hardware-features/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1257-improper-access-control-applied-to-mirrored-or-aliased-memory-regions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1258-exposure-of-sensitive-system-information-due-to-uncleared-debug-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1259-improper-restriction-of-security-token-assignment/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/126-buffer-over-read/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1260-improper-handling-of-overlap-between-protected-memory-ranges/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1261-improper-handling-of-single-event-upsets/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1262-improper-access-control-for-register-interface/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1263-improper-physical-access-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1264-hardware-logic-with-insecure-de-synchronization-between-control-and-data-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1265-unintended-reentrant-invocation-of-non-reentrant-code-via-nested-calls/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1266-improper-scrubbing-of-sensitive-data-from-decommissioned-device/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1267-policy-uses-obsolete-encoding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1268-policy-privileges-are-not-assigned-consistently-between-control-and-data-agents/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1269-product-released-in-non-release-configuration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/127-buffer-under-read/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1270-generation-of-incorrect-security-tokens/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1271-uninitialized-value-on-reset-for-registers-holding-security-settings/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1272-sensitive-information-uncleared-before-debug-power-state-transition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1273-device-unlock-credential-sharing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1274-improper-access-control-for-volatile-memory-containing-boot-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1275-sensitive-cookie-with-improper-samesite-attribute/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1276-hardware-child-block-incorrectly-connected-to-parent-system/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1277-firmware-not-updateable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1278-missing-protection-against-hardware-reverse-engineering-using-integrated-circuit/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1279-cryptographic-operations-are-run-before-supporting-units-are-ready/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/128-wrap-around-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1280-access-control-check-implemented-after-asset-is-accessed/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1281-sequence-of-processor-instructions-leads-to-unexpected-behavior/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1282-assumed-immutable-data-is-stored-in-writable-memory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1283-mutable-attestation-or-measurement-reporting-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1284-improper-validation-of-specified-quantity-in-input/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1285-improper-validation-of-specified-index-position-or-offset-in-input/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1286-improper-validation-of-syntactic-correctness-of-input/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1287-improper-validation-of-specified-type-of-input/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1288-improper-validation-of-consistency-within-input/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1289-improper-validation-of-unsafe-equivalence-in-input/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/129-improper-validation-of-array-index/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1290-incorrect-decoding-of-security-identifiers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1291-public-key-re-use-for-signing-both-debug-and-production-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1292-incorrect-conversion-of-security-identifiers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1293-missing-source-correlation-of-multiple-independent-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1294-insecure-security-identifier-mechanism/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1295-debug-messages-revealing-unnecessary-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1296-incorrect-chaining-or-granularity-of-debug-components/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1297-unprotected-confidential-information-on-device-is-accessible-by-osat-vendors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1298-hardware-logic-contains-race-conditions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1299-missing-protection-mechanism-for-alternate-hardware-interface/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/13-asp-net-misconfiguration-password-in-configuration-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/130-improper-handling-of-length-parameter-inconsistency/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1300-improper-protection-of-physical-side-channels/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1301-insufficient-or-incomplete-data-removal-within-hardware-component/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1302-missing-source-identifier-in-entity-transactions-on-a-system-on-chip-soc/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1303-non-transparent-sharing-of-microarchitectural-resources/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1304-improperly-preserved-integrity-of-hardware-configuration-state-during-a-power-sa/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/131-incorrect-calculation-of-buffer-size/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1310-missing-ability-to-patch-rom-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1311-improper-translation-of-security-attributes-by-fabric-bridge/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1312-missing-protection-for-mirrored-regions-in-on-chip-fabric-firewall/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1313-hardware-allows-activation-of-test-or-debug-logic-at-runtime/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1314-missing-write-protection-for-parametric-data-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1315-improper-setting-of-bus-controlling-capability-in-fabric-end-point/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1316-fabric-address-map-allows-programming-of-unwarranted-overlaps-of-protected-and-u/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1317-improper-access-control-in-fabric-bridge/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1318-missing-support-for-security-features-in-on-chip-fabrics-or-buses/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1319-improper-protection-against-electromagnetic-fault-injection-em-fi/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1320-improper-protection-for-outbound-error-messages-and-alert-signals/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1321-improperly-controlled-modification-of-object-prototype-attributes-prototype-poll/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1322-use-of-blocking-code-in-single-threaded-non-blocking-context/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1323-improper-management-of-sensitive-trace-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1325-improperly-controlled-sequential-memory-allocation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1326-missing-immutable-root-of-trust-in-hardware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1327-binding-to-an-unrestricted-ip-address/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1328-security-version-number-mutable-to-older-versions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1329-reliance-on-component-that-is-not-updateable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1330-remanent-data-readable-after-memory-erase/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1331-improper-isolation-of-shared-resources-in-network-on-chip-noc/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1332-improper-handling-of-faults-that-lead-to-instruction-skips/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1333-inefficient-regular-expression-complexity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1334-unauthorized-error-injection-can-degrade-hardware-redundancy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1335-incorrect-bitwise-shift-of-integer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1336-improper-neutralization-of-special-elements-used-in-a-template-engine/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1338-improper-protections-against-hardware-overheating/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1339-insufficient-precision-or-accuracy-of-a-real-number/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/134-use-of-externally-controlled-format-string/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1341-multiple-releases-of-same-resource-or-handle/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1342-information-exposure-through-microarchitectural-state-after-transient-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/135-incorrect-calculation-of-multi-byte-string-length/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1351-improper-handling-of-hardware-behavior-in-exceptionally-cold-environments/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1357-reliance-on-insufficiently-trustworthy-component/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/138-improper-neutralization-of-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1384-improper-handling-of-physical-or-environmental-conditions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1385-missing-origin-validation-in-websockets/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1386-insecure-operation-on-windows-junction-mount-point/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1389-incorrect-parsing-of-numbers-with-different-radices/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1390-weak-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1391-use-of-weak-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1392-use-of-default-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1393-use-of-default-password/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1394-use-of-default-cryptographic-key/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1395-dependency-on-vulnerable-third-party-component/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/14-compiler-removal-of-code-to-clear-buffers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/140-improper-neutralization-of-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/141-improper-neutralization-of-parameter-argument-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1419-incorrect-initialization-of-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/142-improper-neutralization-of-value-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1420-exposure-of-sensitive-information-during-transient-execution/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1421-exposure-of-sensitive-information-in-shared-microarchitectural-structures-during/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1422-exposure-of-sensitive-information-caused-by-incorrect-data-forwarding-during-tra/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1423-exposure-of-sensitive-information-caused-by-shared-microarchitectural-predictor-/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1426-improper-validation-of-generative-ai-output/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1427-improper-neutralization-of-input-used-for-llm-prompting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1428-reliance-on-http-instead-of-https/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1429-missing-security-relevant-feedback-for-unexecuted-operations-in-hardware-interfa/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/143-improper-neutralization-of-record-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1431-driving-intermediate-cryptographic-state-results-to-hardware-module-outputs/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/1434-insecure-setting-of-generative-ai-ml-model-inference-parameters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/144-improper-neutralization-of-line-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/145-improper-neutralization-of-section-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/146-improper-neutralization-of-expression-command-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/147-improper-neutralization-of-input-terminators/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/148-improper-neutralization-of-input-leaders/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/149-improper-neutralization-of-quoting-syntax/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/15-external-control-of-system-or-configuration-setting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/150-improper-neutralization-of-escape-meta-or-control-sequences/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/151-improper-neutralization-of-comment-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/152-improper-neutralization-of-macro-symbols/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/153-improper-neutralization-of-substitution-characters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/154-improper-neutralization-of-variable-name-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/155-improper-neutralization-of-wildcards-or-matching-symbols/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/156-improper-neutralization-of-whitespace/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/157-failure-to-sanitize-paired-delimiters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/158-improper-neutralization-of-null-byte-or-nul-character/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/159-improper-handling-of-invalid-use-of-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/160-improper-neutralization-of-leading-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/161-improper-neutralization-of-multiple-leading-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/162-improper-neutralization-of-trailing-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/163-improper-neutralization-of-multiple-trailing-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/164-improper-neutralization-of-internal-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/165-improper-neutralization-of-multiple-internal-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/166-improper-handling-of-missing-special-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/167-improper-handling-of-additional-special-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/168-improper-handling-of-inconsistent-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/170-improper-null-termination/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/172-encoding-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/173-improper-handling-of-alternate-encoding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/174-double-decoding-of-the-same-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/175-improper-handling-of-mixed-encoding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/176-improper-handling-of-unicode-encoding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/177-improper-handling-of-url-encoding-hex-encoding/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/178-improper-handling-of-case-sensitivity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/179-incorrect-behavior-order-early-validation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/180-incorrect-behavior-order-validate-before-canonicalize/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/181-incorrect-behavior-order-validate-before-filter/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/182-collapse-of-data-into-unsafe-value/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/183-permissive-list-of-allowed-inputs/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/184-incomplete-list-of-disallowed-inputs/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/185-incorrect-regular-expression/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/186-overly-restrictive-regular-expression/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/187-partial-string-comparison/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/188-reliance-on-data-memory-layout/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/190-integer-overflow-or-wraparound/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/191-integer-underflow-wrap-or-wraparound/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/192-integer-coercion-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/193-off-by-one-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/194-unexpected-sign-extension/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/195-signed-to-unsigned-conversion-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/196-unsigned-to-signed-conversion-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/197-numeric-truncation-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/198-use-of-incorrect-byte-ordering/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/20-improper-input-validation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/200-exposure-of-sensitive-information-to-an-unauthorized-actor/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/201-insertion-of-sensitive-information-into-sent-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/202-exposure-of-sensitive-information-through-data-queries/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/203-observable-discrepancy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/204-observable-response-discrepancy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/205-observable-behavioral-discrepancy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/206-observable-internal-behavioral-discrepancy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/207-observable-behavioral-discrepancy-with-equivalent-products/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/208-observable-timing-discrepancy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/209-generation-of-error-message-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/210-self-generated-error-message-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/211-externally-generated-error-message-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/212-improper-removal-of-sensitive-information-before-storage-or-transfer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/213-exposure-of-sensitive-information-due-to-incompatible-policies/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/214-invocation-of-process-using-visible-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/215-insertion-of-sensitive-information-into-debugging-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/219-storage-of-file-with-sensitive-data-under-web-root/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/220-storage-of-file-with-sensitive-data-under-ftp-root/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/221-information-loss-or-omission/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/222-truncation-of-security-relevant-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/223-omission-of-security-relevant-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/224-obscured-security-relevant-information-by-alternate-name/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/226-sensitive-information-in-resource-not-removed-before-reuse/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/228-improper-handling-of-syntactically-invalid-structure/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/229-improper-handling-of-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/23-relative-path-traversal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/230-improper-handling-of-missing-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/231-improper-handling-of-extra-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/232-improper-handling-of-undefined-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/233-improper-handling-of-parameters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/234-failure-to-handle-missing-parameter/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/235-improper-handling-of-extra-parameters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/236-improper-handling-of-undefined-parameters/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/237-improper-handling-of-structural-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/238-improper-handling-of-incomplete-structural-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/239-failure-to-handle-incomplete-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/24-path-traversal-filedir/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/240-improper-handling-of-inconsistent-structural-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/241-improper-handling-of-unexpected-data-type/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/242-use-of-inherently-dangerous-function/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/243-creation-of-chroot-jail-without-changing-working-directory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/244-improper-clearing-of-heap-memory-before-release-heap-inspection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/245-j2ee-bad-practices-direct-management-of-connections/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/246-j2ee-bad-practices-direct-use-of-sockets/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/248-uncaught-exception/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/25-path-traversal-filedir/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/250-execution-with-unnecessary-privileges/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/252-unchecked-return-value/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/253-incorrect-check-of-function-return-value/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/256-plaintext-storage-of-a-password/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/257-storing-passwords-in-a-recoverable-format/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/258-empty-password-in-configuration-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/259-use-of-hard-coded-password/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/26-path-traversal-dir-filename/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/260-password-in-configuration-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/261-weak-encoding-for-password/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/262-not-using-password-aging/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/263-password-aging-with-long-expiration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/266-incorrect-privilege-assignment/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/267-privilege-defined-with-unsafe-actions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/268-privilege-chaining/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/269-improper-privilege-management/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/27-path-traversal-dir-filename/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/270-privilege-context-switching-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/271-privilege-dropping-lowering-errors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/272-least-privilege-violation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/273-improper-check-for-dropped-privileges/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/274-improper-handling-of-insufficient-privileges/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/276-incorrect-default-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/277-insecure-inherited-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/278-insecure-preserved-inherited-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/279-incorrect-execution-assigned-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/28-path-traversal-filedir/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/280-improper-handling-of-insufficient-permissions-or-privileges/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/281-improper-preservation-of-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/282-improper-ownership-management/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/283-unverified-ownership/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/284-improper-access-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/285-improper-authorization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/286-incorrect-user-management/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/287-improper-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/288-authentication-bypass-using-an-alternate-path-or-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/289-authentication-bypass-by-alternate-name/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/29-path-traversal-filename/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/290-authentication-bypass-by-spoofing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/291-reliance-on-ip-address-for-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/293-using-referer-field-for-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/294-authentication-bypass-by-capture-replay/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/295-improper-certificate-validation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/296-improper-following-of-a-certificate-s-chain-of-trust/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/297-improper-validation-of-certificate-with-host-mismatch/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/298-improper-validation-of-certificate-expiration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/299-improper-check-for-certificate-revocation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/30-path-traversal-dir-filename/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/300-channel-accessible-by-non-endpoint/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/301-reflection-attack-in-an-authentication-protocol/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/302-authentication-bypass-by-assumed-immutable-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/303-incorrect-implementation-of-authentication-algorithm/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/304-missing-critical-step-in-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/305-authentication-bypass-by-primary-weakness/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/306-missing-authentication-for-critical-function/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/307-improper-restriction-of-excessive-authentication-attempts/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/308-use-of-single-factor-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/309-use-of-password-system-for-primary-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/31-path-traversal-dir-filename/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/311-missing-encryption-of-sensitive-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/312-cleartext-storage-of-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/313-cleartext-storage-in-a-file-or-on-disk/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/314-cleartext-storage-in-the-registry/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/315-cleartext-storage-of-sensitive-information-in-a-cookie/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/316-cleartext-storage-of-sensitive-information-in-memory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/317-cleartext-storage-of-sensitive-information-in-gui/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/318-cleartext-storage-of-sensitive-information-in-executable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/319-cleartext-transmission-of-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/32-path-traversal-triple-dot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/321-use-of-hard-coded-cryptographic-key/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/322-key-exchange-without-entity-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/323-reusing-a-nonce-key-pair-in-encryption/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/324-use-of-a-key-past-its-expiration-date/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/325-missing-cryptographic-step/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/326-inadequate-encryption-strength/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/327-use-of-a-broken-or-risky-cryptographic-algorithm/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/328-use-of-weak-hash/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/329-generation-of-predictable-iv-with-cbc-mode/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/33-path-traversal-multiple-dot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/330-use-of-insufficiently-random-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/331-insufficient-entropy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/332-insufficient-entropy-in-prng/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/333-improper-handling-of-insufficient-entropy-in-trng/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/334-small-space-of-random-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/335-incorrect-usage-of-seeds-in-pseudo-random-number-generator-prng/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/336-same-seed-in-pseudo-random-number-generator-prng/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/337-predictable-seed-in-pseudo-random-number-generator-prng/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/338-use-of-cryptographically-weak-pseudo-random-number-generator-prng/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/339-small-seed-space-in-prng/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/34-path-traversal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/340-generation-of-predictable-numbers-or-identifiers/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/341-predictable-from-observable-state/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/342-predictable-exact-value-from-previous-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/343-predictable-value-range-from-previous-values/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/344-use-of-invariant-value-in-dynamically-changing-context/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/345-insufficient-verification-of-data-authenticity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/346-origin-validation-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/347-improper-verification-of-cryptographic-signature/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/348-use-of-less-trusted-source/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/349-acceptance-of-extraneous-untrusted-data-with-trusted-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/35-path-traversal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/350-reliance-on-reverse-dns-resolution-for-a-security-critical-action/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/351-insufficient-type-distinction/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/352-cross-site-request-forgery-csrf/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/353-missing-support-for-integrity-check/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/354-improper-validation-of-integrity-check-value/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/356-product-ui-does-not-warn-user-of-unsafe-actions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/357-insufficient-ui-warning-of-dangerous-operations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/358-improperly-implemented-security-check-for-standard/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/359-exposure-of-private-personal-information-to-an-unauthorized-actor/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/36-absolute-path-traversal/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/360-trust-of-system-event-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-co/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/363-race-condition-enabling-link-following/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/364-signal-handler-race-condition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/366-race-condition-within-a-thread/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/367-time-of-check-time-of-use-toctou-race-condition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/368-context-switching-race-condition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/369-divide-by-zero/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/37-path-traversal-absolute-pathname-here/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/370-missing-check-for-certificate-revocation-after-initial-check/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/372-incomplete-internal-state-distinction/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/374-passing-mutable-objects-to-an-untrusted-method/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/375-returning-a-mutable-object-to-an-untrusted-caller/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/377-insecure-temporary-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/378-creation-of-temporary-file-with-insecure-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/379-creation-of-temporary-file-in-directory-with-insecure-permissions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/38-path-traversal-absolute-pathname-here/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/382-j2ee-bad-practices-use-of-system-exit/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/383-j2ee-bad-practices-direct-use-of-threads/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/384-session-fixation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/385-covert-timing-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/386-symbolic-name-not-mapping-to-correct-object/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/39-path-traversal-c-dirname/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/390-detection-of-error-condition-without-action/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/391-unchecked-error-condition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/392-missing-report-of-error-condition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/393-return-of-wrong-status-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/394-unexpected-status-code-or-return-value/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/395-use-of-nullpointerexception-catch-to-detect-null-pointer-dereference/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/396-declaration-of-catch-for-generic-exception/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/397-declaration-of-throws-for-generic-exception/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/40-path-traversal-unc-share-name-windows-unc-share/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/400-uncontrolled-resource-consumption/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/401-missing-release-of-memory-after-effective-lifetime/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/402-transmission-of-private-resources-into-a-new-sphere-resource-leak/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/403-exposure-of-file-descriptor-to-unintended-control-sphere-file-descriptor-leak/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/404-improper-resource-shutdown-or-release/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/405-asymmetric-resource-consumption-amplification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/406-insufficient-control-of-network-message-volume-network-amplification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/407-inefficient-algorithmic-complexity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/408-incorrect-behavior-order-early-amplification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/409-improper-handling-of-highly-compressed-data-data-amplification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/41-improper-resolution-of-path-equivalence/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/410-insufficient-resource-pool/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/412-unrestricted-externally-accessible-lock/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/413-improper-resource-locking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/414-missing-lock-check/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/415-double-free/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/416-use-after-free/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/419-unprotected-primary-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/42-path-equivalence-filename-trailing-dot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/420-unprotected-alternate-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/421-race-condition-during-access-to-alternate-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/422-unprotected-windows-messaging-channel-shatter/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/424-improper-protection-of-alternate-path/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/425-direct-request-forced-browsing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/426-untrusted-search-path/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/427-uncontrolled-search-path-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/428-unquoted-search-path-or-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/43-path-equivalence-filename-multiple-trailing-dot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/430-deployment-of-wrong-handler/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/431-missing-handler/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/432-dangerous-signal-handler-not-disabled-during-sensitive-operations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/433-unparsed-raw-web-content-delivery/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/434-unrestricted-upload-of-file-with-dangerous-type/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/435-improper-interaction-between-multiple-correctly-behaving-entities/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/436-interpretation-conflict/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/437-incomplete-model-of-endpoint-features/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/439-behavioral-change-in-new-version-or-environment/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/44-path-equivalence-file-name-internal-dot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/440-expected-behavior-violation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/441-unintended-proxy-or-intermediary-confused-deputy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/446-ui-discrepancy-for-security-feature/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/447-unimplemented-or-unsupported-feature-in-ui/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/448-obsolete-feature-in-ui/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/449-the-ui-performs-the-wrong-action/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/45-path-equivalence-file-name-multiple-internal-dot/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/450-multiple-interpretations-of-ui-input/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/451-user-interface-ui-misrepresentation-of-critical-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/453-insecure-default-variable-initialization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/454-external-initialization-of-trusted-variables-or-data-stores/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/455-non-exit-on-failed-initialization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/456-missing-initialization-of-a-variable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/457-use-of-uninitialized-variable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/459-incomplete-cleanup/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/46-path-equivalence-filename-trailing-space/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/460-improper-cleanup-on-thrown-exception/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/462-duplicate-key-in-associative-list-alist/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/463-deletion-of-data-structure-sentinel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/464-addition-of-data-structure-sentinel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/466-return-of-pointer-value-outside-of-expected-range/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/467-use-of-sizeof-on-a-pointer-type/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/468-incorrect-pointer-scaling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/469-use-of-pointer-subtraction-to-determine-size/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/47-path-equivalence-filename-leading-space/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/470-use-of-externally-controlled-input-to-select-classes-or-code-unsafe-reflection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/471-modification-of-assumed-immutable-data-maid/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/472-external-control-of-assumed-immutable-web-parameter/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/473-php-external-variable-modification/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/474-use-of-function-with-inconsistent-implementations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/475-undefined-behavior-for-input-to-api/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/476-null-pointer-dereference/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/477-use-of-obsolete-function/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/478-missing-default-case-in-multiple-condition-expression/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/479-signal-handler-use-of-a-non-reentrant-function/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/48-path-equivalence-file-name-internal-whitespace/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/480-use-of-incorrect-operator/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/481-assigning-instead-of-comparing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/482-comparing-instead-of-assigning/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/483-incorrect-block-delimitation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/484-omitted-break-statement-in-switch/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/486-comparison-of-classes-by-name/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/487-reliance-on-package-level-scope/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/488-exposure-of-data-element-to-wrong-session/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/489-active-debug-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/49-path-equivalence-filename-trailing-slash/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/491-public-cloneable-method-without-final-object-hijack/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/492-use-of-inner-class-containing-sensitive-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/493-critical-public-variable-without-final-modifier/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/494-download-of-code-without-integrity-check/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/495-private-data-structure-returned-from-a-public-method/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/496-public-data-assigned-to-private-array-typed-field/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/498-cloneable-class-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/499-serializable-class-containing-sensitive-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/5-j2ee-misconfiguration-data-transmission-without-encryption/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/50-path-equivalence-multiple-leading-slash/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/500-public-static-field-not-marked-final/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/501-trust-boundary-violation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/502-deserialization-of-untrusted-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/506-embedded-malicious-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/507-trojan-horse/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/508-non-replicating-malicious-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/509-replicating-malicious-code-virus-or-worm/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/51-path-equivalence-multiple-internal-slash/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/510-trapdoor/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/511-logic-time-bomb/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/512-spyware/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/514-covert-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/515-covert-storage-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/52-path-equivalence-multiple-trailing-slash/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/520-net-misconfiguration-use-of-impersonation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/521-weak-password-requirements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/522-insufficiently-protected-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/523-unprotected-transport-of-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/524-use-of-cache-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/525-use-of-web-browser-cache-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/526-cleartext-storage-of-sensitive-information-in-an-environment-variable/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/527-exposure-of-version-control-repository-to-an-unauthorized-control-sphere/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/528-exposure-of-core-dump-file-to-an-unauthorized-control-sphere/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/529-exposure-of-access-control-list-files-to-an-unauthorized-control-sphere/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/53-path-equivalence-multiple-internal-backslash/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/530-exposure-of-backup-file-to-an-unauthorized-control-sphere/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/531-inclusion-of-sensitive-information-in-test-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/532-insertion-of-sensitive-information-into-log-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/535-exposure-of-information-through-shell-error-message/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/536-servlet-runtime-error-message-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/537-java-runtime-error-message-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/538-insertion-of-sensitive-information-into-externally-accessible-file-or-directory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/539-use-of-persistent-cookies-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/54-path-equivalence-filedir-trailing-backslash/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/540-inclusion-of-sensitive-information-in-source-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/541-inclusion-of-sensitive-information-in-an-include-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/543-use-of-singleton-pattern-without-synchronization-in-a-multithreaded-context/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/544-missing-standardized-error-handling-mechanism/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/546-suspicious-comment/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/547-use-of-hard-coded-security-relevant-constants/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/548-exposure-of-information-through-directory-listing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/549-missing-password-field-masking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/55-path-equivalence-single-dot-directory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/550-server-generated-error-message-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/551-incorrect-behavior-order-authorization-before-parsing-and-canonicalization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/552-files-or-directories-accessible-to-external-parties/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/553-command-shell-in-externally-accessible-directory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/554-asp-net-misconfiguration-not-using-input-validation-framework/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/555-j2ee-misconfiguration-plaintext-password-in-configuration-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/556-asp-net-misconfiguration-use-of-identity-impersonation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/558-use-of-getlogin-in-multithreaded-application/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/56-path-equivalence-filedir-wildcard/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/560-use-of-umask-with-chmod-style-argument/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/561-dead-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/562-return-of-stack-variable-address/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/563-assignment-to-variable-without-use/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/564-sql-injection-hibernate/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/565-reliance-on-cookies-without-validation-and-integrity-checking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/566-authorization-bypass-through-user-controlled-sql-primary-key/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/567-unsynchronized-access-to-shared-data-in-a-multithreaded-context/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/568-finalize-method-without-super-finalize/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/57-path-equivalence-fakedir-realdir-filename/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/570-expression-is-always-false/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/571-expression-is-always-true/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/572-call-to-thread-run-instead-of-start/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/573-improper-following-of-specification-by-caller/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/574-ejb-bad-practices-use-of-synchronization-primitives/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/575-ejb-bad-practices-use-of-awt-swing/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/576-ejb-bad-practices-use-of-java-i-o/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/577-ejb-bad-practices-use-of-sockets/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/578-ejb-bad-practices-use-of-class-loader/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/579-j2ee-bad-practices-non-serializable-object-stored-in-session/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/58-path-equivalence-windows-8-3-filename/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/580-clone-method-without-super-clone/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/581-object-model-violation-just-one-of-equals-and-hashcode-defined/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/582-array-declared-public-final-and-static/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/583-finalize-method-declared-public/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/584-return-inside-finally-block/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/585-empty-synchronized-block/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/586-explicit-call-to-finalize/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/587-assignment-of-a-fixed-address-to-a-pointer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/588-attempt-to-access-child-of-a-non-structure-pointer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/589-call-to-non-ubiquitous-api/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/59-improper-link-resolution-before-file-access-link-following/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/590-free-of-memory-not-on-the-heap/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/591-sensitive-data-storage-in-improperly-locked-memory/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/593-authentication-bypass-openssl-ctx-object-modified-after-ssl-objects-are-created/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/594-j2ee-framework-saving-unserializable-objects-to-disk/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/595-comparison-of-object-references-instead-of-object-contents/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/597-use-of-wrong-operator-in-string-comparison/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/598-use-of-http-request-with-sensitive-query-string/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/599-missing-validation-of-openssl-certificate/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/6-j2ee-misconfiguration-insufficient-session-id-length/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/600-uncaught-exception-in-servlet/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/601-url-redirection-to-untrusted-site-open-redirect/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/602-client-side-enforcement-of-server-side-security/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/603-use-of-client-side-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/605-multiple-binds-to-the-same-port/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/606-unchecked-input-for-loop-condition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/607-public-static-final-field-references-mutable-object/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/608-struts-non-private-field-in-actionform-class/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/609-double-checked-locking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/61-unix-symbolic-link-symlink-following/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/610-externally-controlled-reference-to-a-resource-in-another-sphere/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/611-improper-restriction-of-xml-external-entity-reference/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/612-improper-authorization-of-index-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/613-insufficient-session-expiration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/614-sensitive-cookie-in-https-session-without-secure-attribute/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/615-inclusion-of-sensitive-information-in-source-code-comments/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/616-incomplete-identification-of-uploaded-file-variables-php/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/617-reachable-assertion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/618-exposed-unsafe-activex-method/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/619-dangling-database-cursor-cursor-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/62-unix-hard-link/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/620-unverified-password-change/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/621-variable-extraction-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/622-improper-validation-of-function-hook-arguments/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/623-unsafe-activex-control-marked-safe-for-scripting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/624-executable-regular-expression-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/625-permissive-regular-expression/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/626-null-byte-interaction-error-poison-null-byte/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/627-dynamic-variable-evaluation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/628-function-call-with-incorrectly-specified-arguments/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/636-not-failing-securely-failing-open/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/637-unnecessary-complexity-in-protection-mechanism-not-using-economy-of-mechanism/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/638-not-using-complete-mediation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/639-authorization-bypass-through-user-controlled-key/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/64-windows-shortcut-following-lnk/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/640-weak-password-recovery-mechanism-for-forgotten-password/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/641-improper-restriction-of-names-for-files-and-other-resources/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/642-external-control-of-critical-state-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/643-improper-neutralization-of-data-within-xpath-expressions-xpath-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/644-improper-neutralization-of-http-headers-for-scripting-syntax/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/645-overly-restrictive-account-lockout-mechanism/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/646-reliance-on-file-name-or-extension-of-externally-supplied-file/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/647-use-of-non-canonical-url-paths-for-authorization-decisions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/648-incorrect-use-of-privileged-apis/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/649-reliance-on-obfuscation-or-encryption-of-security-relevant-inputs-without-integr/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/65-windows-hard-link/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/650-trusting-http-permission-methods-on-the-server-side/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/651-exposure-of-wsdl-file-containing-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/652-improper-neutralization-of-data-within-xquery-expressions-xquery-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/653-improper-isolation-or-compartmentalization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/654-reliance-on-a-single-factor-in-a-security-decision/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/655-insufficient-psychological-acceptability/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/656-reliance-on-security-through-obscurity/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/657-violation-of-secure-design-principles/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/66-improper-handling-of-file-names-that-identify-virtual-resources/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/662-improper-synchronization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/663-use-of-a-non-reentrant-function-in-a-concurrent-context/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/664-improper-control-of-a-resource-through-its-lifetime/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/665-improper-initialization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/666-operation-on-resource-in-wrong-phase-of-lifetime/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/667-improper-locking/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/668-exposure-of-resource-to-wrong-sphere/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/669-incorrect-resource-transfer-between-spheres/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/67-improper-handling-of-windows-device-names/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/670-always-incorrect-control-flow-implementation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/671-lack-of-administrator-control-over-security/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/672-operation-on-a-resource-after-expiration-or-release/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/673-external-influence-of-sphere-definition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/674-uncontrolled-recursion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/675-multiple-operations-on-resource-in-single-operation-context/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/676-use-of-potentially-dangerous-function/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/680-integer-overflow-to-buffer-overflow/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/681-incorrect-conversion-between-numeric-types/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/682-incorrect-calculation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/683-function-call-with-incorrect-order-of-arguments/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/684-incorrect-provision-of-specified-functionality/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/685-function-call-with-incorrect-number-of-arguments/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/686-function-call-with-incorrect-argument-type/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/687-function-call-with-incorrectly-specified-argument-value/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/688-function-call-with-incorrect-variable-or-reference-as-argument/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/689-permission-race-condition-during-resource-copy/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/69-improper-handling-of-windows-data-alternate-data-stream/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/690-unchecked-return-value-to-null-pointer-dereference/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/691-insufficient-control-flow-management/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/692-incomplete-denylist-to-cross-site-scripting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/693-protection-mechanism-failure/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/694-use-of-multiple-resources-with-duplicate-identifier/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/695-use-of-low-level-functionality/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/696-incorrect-behavior-order/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/697-incorrect-comparison/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/698-execution-after-redirect-ear/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/7-j2ee-misconfiguration-missing-custom-error-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/703-improper-check-or-handling-of-exceptional-conditions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/704-incorrect-type-conversion-or-cast/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/705-incorrect-control-flow-scoping/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/706-use-of-incorrectly-resolved-name-or-reference/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/707-improper-neutralization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/708-incorrect-ownership-assignment/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/710-improper-adherence-to-coding-standards/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/72-improper-handling-of-apple-hfs-alternate-data-stream-path/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/73-external-control-of-file-name-or-path/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/732-incorrect-permission-assignment-for-critical-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/733-compiler-optimization-removal-or-modification-of-security-critical-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-compo/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/749-exposed-dangerous-method-or-function/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/75-failure-to-sanitize-special-elements-into-a-different-plane-special-element-inje/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/754-improper-check-for-unusual-or-exceptional-conditions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/755-improper-handling-of-exceptional-conditions/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/756-missing-custom-error-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/757-selection-of-less-secure-algorithm-during-negotiation-algorithm-downgrade/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/758-reliance-on-undefined-unspecified-or-implementation-defined-behavior/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/759-use-of-a-one-way-hash-without-a-salt/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/76-improper-neutralization-of-equivalent-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/760-use-of-a-one-way-hash-with-a-predictable-salt/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/761-free-of-pointer-not-at-start-of-buffer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/762-mismatched-memory-management-routines/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/763-release-of-invalid-pointer-or-reference/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/764-multiple-locks-of-a-critical-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/765-multiple-unlocks-of-a-critical-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/766-critical-data-element-declared-public/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/767-access-to-critical-private-variable-via-public-method/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/768-incorrect-short-circuit-evaluation/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/77-improper-neutralization-of-special-elements-used-in-a-command-command-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/770-allocation-of-resources-without-limits-or-throttling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/771-missing-reference-to-active-allocated-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/772-missing-release-of-resource-after-effective-lifetime/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/773-missing-reference-to-active-file-descriptor-or-handle/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/774-allocation-of-file-descriptors-or-handles-without-limits-or-throttling/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/775-missing-release-of-file-descriptor-or-handle-after-effective-lifetime/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/776-improper-restriction-of-recursive-entity-references-in-dtds-xml-entity-expansion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/777-regular-expression-without-anchors/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/778-insufficient-logging/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/779-logging-of-excessive-data/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-inj/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/780-use-of-rsa-algorithm-without-oaep/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/781-improper-address-validation-in-ioctl-with-method-neither-i-o-control-code/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/782-exposed-ioctl-with-insufficient-access-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/783-operator-precedence-logic-error/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/784-reliance-on-cookies-without-validation-and-integrity-checking-in-a-security-deci/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/785-use-of-path-manipulation-function-without-maximum-sized-buffer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/786-access-of-memory-location-before-start-of-buffer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/787-out-of-bounds-write/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/788-access-of-memory-location-after-end-of-buffer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/789-memory-allocation-with-excessive-size-value/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/790-improper-filtering-of-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/791-incomplete-filtering-of-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/792-incomplete-filtering-of-one-or-more-instances-of-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/793-only-filtering-one-instance-of-a-special-element/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/794-incomplete-filtering-of-multiple-instances-of-special-elements/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/795-only-filtering-special-elements-at-a-specified-location/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/796-only-filtering-special-elements-relative-to-a-marker/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/797-only-filtering-special-elements-at-an-absolute-position/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/798-use-of-hard-coded-credentials/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/799-improper-control-of-interaction-frequency/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/8-j2ee-misconfiguration-entity-bean-declared-remote/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/804-guessable-captcha/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/805-buffer-access-with-incorrect-length-value/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/806-buffer-access-using-size-of-source-buffer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/807-reliance-on-untrusted-inputs-in-a-security-decision/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/81-improper-neutralization-of-script-in-an-error-message-web-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/82-improper-neutralization-of-script-in-attributes-of-img-tags-in-a-web-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/820-missing-synchronization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/821-incorrect-synchronization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/822-untrusted-pointer-dereference/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/823-use-of-out-of-range-pointer-offset/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/824-access-of-uninitialized-pointer/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/825-expired-pointer-dereference/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/826-premature-release-of-resource-during-expected-lifetime/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/827-improper-control-of-document-type-definition/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/828-signal-handler-with-functionality-that-is-not-asynchronous-safe/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/829-inclusion-of-functionality-from-untrusted-control-sphere/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/83-improper-neutralization-of-script-in-attributes-in-a-web-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/830-inclusion-of-web-functionality-from-an-untrusted-source/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/831-signal-handler-function-associated-with-multiple-signals/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/832-unlock-of-a-resource-that-is-not-locked/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/833-deadlock/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/834-excessive-iteration/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/835-loop-with-unreachable-exit-condition-infinite-loop/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/836-use-of-password-hash-instead-of-password-for-authentication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/837-improper-enforcement-of-a-single-unique-action/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/838-inappropriate-encoding-for-output-context/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/839-numeric-range-comparison-without-minimum-check/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/84-improper-neutralization-of-encoded-uri-schemes-in-a-web-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/841-improper-enforcement-of-behavioral-workflow/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/842-placement-of-user-into-incorrect-group/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/843-access-of-resource-using-incompatible-type-type-confusion/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/85-doubled-character-xss-manipulations/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/86-improper-neutralization-of-invalid-characters-in-identifiers-in-web-pages/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/862-missing-authorization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/863-incorrect-authorization/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/87-improper-neutralization-of-alternate-xss-syntax/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/9-j2ee-misconfiguration-weak-access-permissions-for-ejb-methods/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/90-improper-neutralization-of-special-elements-used-in-an-ldap-query-ldap-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/908-use-of-uninitialized-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/909-missing-initialization-of-resource/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/91-xml-injection-aka-blind-xpath-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/910-use-of-expired-file-descriptor/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/911-improper-update-of-reference-count/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/912-hidden-functionality/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/913-improper-control-of-dynamically-managed-code-resources/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/914-improper-control-of-dynamically-identified-variables/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/915-improperly-controlled-modification-of-dynamically-determined-object-attributes/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/916-use-of-password-hash-with-insufficient-computational-effort/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/917-improper-neutralization-of-special-elements-used-in-an-expression-language-state/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/918-server-side-request-forgery-ssrf/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/920-improper-restriction-of-power-consumption/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/921-storage-of-sensitive-data-in-a-mechanism-without-access-control/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/922-insecure-storage-of-sensitive-information/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/923-improper-restriction-of-communication-channel-to-intended-endpoints/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/924-improper-enforcement-of-message-integrity-during-transmission-in-a-communication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/925-improper-verification-of-intent-by-broadcast-receiver/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/926-improper-export-of-android-application-components/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/927-use-of-implicit-intent-for-sensitive-communication/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/93-improper-neutralization-of-crlf-sequences-crlf-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/939-improper-authorization-in-handler-for-custom-url-scheme/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/94-improper-control-of-generation-of-code-code-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/940-improper-verification-of-source-of-a-communication-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/941-incorrectly-specified-destination-in-a-communication-channel/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/942-permissive-cross-domain-security-policy-with-untrusted-domains/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/943-improper-neutralization-of-special-elements-in-data-query-logic/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injecti/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/96-improper-neutralization-of-directives-in-statically-saved-code-static-code-injec/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/97-improper-neutralization-of-server-side-includes-ssi-within-a-web-page/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/98-improper-control-of-filename-for-include-require-statement-in-php-program-php-re/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
<url><loc>https://blog.pentestnepal.tech/cwe/99-improper-control-of-resource-identifiers-resource-injection/</loc><lastmod>2026-05-24</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
</urlset>