<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.crace.io/default-risk-database</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://www.crace.io/login</loc><lastmod>2025-07-02</lastmod></url><url><loc>https://www.crace.io/essential-cybersecurity-requirements</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://www.crace.io/</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://www.crace.io/401</loc><lastmod>2025-06-19</lastmod></url><url><loc>https://www.crace.io/product-attributes-details</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://www.crace.io/essential-cybersecurity-requirements-details</loc><lastmod>2025-07-14</lastmod></url><url><loc>https://www.crace.io/get-my-risk-assessment</loc><lastmod>2025-07-02</lastmod></url><url><loc>https://www.crace.io/risk-assessment-engine</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://www.crace.io/forgot-password</loc><lastmod>2025-06-19</lastmod></url><url><loc>https://www.crace.io/risk-assessment-report</loc><lastmod>2025-07-14</lastmod></url><url><loc>https://www.crace.io/knowledge-base</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://www.crace.io/reset-password</loc><lastmod>2025-06-19</lastmod></url><url><loc>https://www.crace.io/404</loc><lastmod>2025-06-19</lastmod></url><url><loc>https://www.crace.io/link-expired</loc><lastmod>2025-06-19</lastmod></url><url><loc>https://www.crace.io/about-me</loc><lastmod>2025-07-01</lastmod></url><url><loc>https://www.crace.io/default-risk-database-details/battery-depletion-attack-on-bluetooth-le-device/r/rec9NvHGmdzEXH9SX</loc></url><url><loc>https://www.crace.io/default-risk-database-details/financial-loss-via-ransomware-on-building-management-system/r/rec1xEuJPuoKTrcFx</loc></url><url><loc>https://www.crace.io/default-risk-database-details/session-hijacking-via-exposed-oauth-authorization-code/r/rec0AdpF8l4oT7iM9</loc></url><url><loc>https://www.crace.io/default-risk-database-details/session-donation-attack/r/rec5yKWxICPrCGzLt</loc></url><url><loc>https://www.crace.io/default-risk-database-details/lack-of-brute-force-protection-on-mfa-implementation/r/recL06wu6BciYjXBv</loc></url><url><loc>https://www.crace.io/default-risk-database-details/authentication-bypass-using-stolen-biometric-data/r/recGy0ixGSE5cK8Wy</loc></url><url><loc>https://www.crace.io/default-risk-database-details/market-manipulation-via-hacked-financial-alerting-system/r/recylYpb8SGsn2FLE</loc></url><url><loc>https://www.crace.io/default-risk-database-details/user-impersonation-and-phishing-via-lack-of-message-authentication-in-chat/r/recLMSAGXclwHKWZT</loc></url><url><loc>https://www.crace.io/default-risk-database-details/dom-based-cross-site-scripting/r/recphzTIxUI47oLfk</loc></url><url><loc>https://www.crace.io/default-risk-database-details/stalking-or-physical-harm-via-geolocation-data-leakage/r/rec8RjrrX3RBreOqK</loc></url><url><loc>https://www.crace.io/default-risk-database-details/exploitation-of-game-client-via-malicious-server/r/rectyNjbT7FEZmXrK</loc></url><url><loc>https://www.crace.io/default-risk-database-details/server-side-request-forgery-%28ssrf%29-via-webhook-functionality/r/rec1qdkAJwOcD8Hf6</loc></url><url><loc>https://www.crace.io/default-risk-database-details/cascading-failure-of-smart-home-via-compromised-hub/r/reclVmLCCafmv8bCY</loc></url><url><loc>https://www.crace.io/default-risk-database-details/deauthentication-attack-on-wi-fi-network/r/rec9jaJ5TpoTIldXs</loc></url><url><loc>https://www.crace.io/default-risk-database-details/resource-leak-in-a-kernel-driver-leading-to-system-crash/r/recC54TigyzrjEIBE</loc></url><url><loc>https://www.crace.io/default-risk-database-details/dns-cache-poisoning/r/recWZBQ036yfxdHhE</loc></url><url><loc>https://www.crace.io/default-risk-database-details/physical-fire-hazard-due-to-malicious-control-of-battery-charging/r/recCKDG524M8ik0yz</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-exfiltration-via-compromised-analytics-sdk/r/rechX2ZUe1TafZDBK</loc></url><url><loc>https://www.crace.io/default-risk-database-details/side-channel-attack-on-hsm-to-extract-cryptographic-keys/r/recHnCzmQg5pWeyxc</loc></url><url><loc>https://www.crace.io/default-risk-database-details/account-takeover-via-leaked-password-reset-link/r/rechBZN1sIcgtLOpB</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-loss-after-subscription-cancellation-due-to-poor-data-management/r/recEgYerY7AuNOW4s</loc></url><url><loc>https://www.crace.io/default-risk-database-details/application-crash-due-to-incompatible-system-library-version/r/recv5X6wy9eTjQYSj</loc></url><url><loc>https://www.crace.io/default-risk-database-details/authentication-bypass-via-type-juggling-vulnerability-in-php/r/recXz50JoibL2HKjj</loc></url><url><loc>https://www.crace.io/default-risk-database-details/permanent-denial-of-service-by-%22bricking%22-a-device-via-firmware-flash/r/recv8vAnWj0av7bm5</loc></url><url><loc>https://www.crace.io/default-risk-database-details/insecure-storage-of-photos%2Fvideos-on-mobile-device/r/recG2WNMCJUPWpC2E</loc></url><url><loc>https://www.crace.io/default-risk-database-details/container-escape-via-kernel-exploit/r/recXJB2L4xPukeyGn</loc></url><url><loc>https://www.crace.io/default-risk-database-details/local-file-inclusion-%28lfi%29-via-unvalidated-user-input/r/recHP156ugcFfzrVS</loc></url><url><loc>https://www.crace.io/default-risk-database-details/code-signing-bypass-due-to-statically-linked-vulnerable-library/r/reclKmQ9IIcWx4xRF</loc></url><url><loc>https://www.crace.io/default-risk-database-details/theft-of-resources-via-hacked-utility-metering-software/r/recBFDC6kud3OLkwf</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-via-%22text-bomb%22-in-chat-application/r/recC8jnlnZa84Hazo</loc></url><url><loc>https://www.crace.io/default-risk-database-details/jwt-%27alg%3Anone%27-vulnerability-allows-authentication-bypass/r/recJsVBvbXZIK2oNE</loc></url><url><loc>https://www.crace.io/default-risk-database-details/information-warfare-via-compromised-news-application/r/recdzpxqE4W7zr6FC</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-in-a-game-via-game-state-manipulation/r/recA77HMOfBOvIRtH</loc></url><url><loc>https://www.crace.io/default-risk-database-details/unauthorized-device-control-via-bluetooth-replay-attack/r/recLMLzIXV8rnQ7gZ</loc></url><url><loc>https://www.crace.io/default-risk-database-details/blackmail-via-covert-screen-recording-of-private-activity/r/recGXCFq6UlOGNLZb</loc></url><url><loc>https://www.crace.io/default-risk-database-details/memory-leak-in-a-long-running-service-leading-to-denial-of-service/r/recNhYWoLfHnJZdIF</loc></url><url><loc>https://www.crace.io/default-risk-database-details/business-logic-flaw-in-a-multi-tenant-environment-allows-resource-hoarding/r/recXMDIsUSFn3vJfH</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-via-unstable-third-party-driver/r/recaEZyrV0hz4yvz5</loc></url><url><loc>https://www.crace.io/default-risk-database-details/privacy-breach-via-data-aggregation-by-analytics-company/r/recX2cCbA51MXup8k</loc></url><url><loc>https://www.crace.io/default-risk-database-details/cross-site-websocket-hijacking-%28cswh%29/r/reczG5mBFteiTOFxu</loc></url><url><loc>https://www.crace.io/default-risk-database-details/password-spraying-attack/r/recvgPtZnaBmtgVFc</loc></url><url><loc>https://www.crace.io/default-risk-database-details/account-takeover-via-insecure-password-recovery/r/recOF2pNyuKjKYO1P</loc></url><url><loc>https://www.crace.io/default-risk-database-details/sandbox-escape-via-jit-compiler-vulnerability/r/recD3G8Xw6EkRYYZh</loc></url><url><loc>https://www.crace.io/default-risk-database-details/dependency-confusion-attack-in-private-package-management/r/rec6O6sUrDNmPokDy</loc></url><url><loc>https://www.crace.io/default-risk-database-details/resource-exhaustion-in-a-multi-tenant-environment-by-a-%22noisy-neighbor%22/r/recTEFPLE8IVl1Ywy</loc></url><url><loc>https://www.crace.io/default-risk-database-details/privilege-escalation-via-insecure-file-operations-in-a-privileged-process/r/recgXEcbKtGoaK2t9</loc></url><url><loc>https://www.crace.io/default-risk-database-details/harassment-and-abuse-via-unmoderated-in-game-chat/r/recXZOMVXmC3OwXNr</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-exfiltration-via-malicious-wordpress-plugin/r/recbvNwzOMWR8bIr9</loc></url><url><loc>https://www.crace.io/default-risk-database-details/violation-of-software-license-via-unauthorized-use-of-a-plugin/r/recdYNF7CmreV4ekD</loc></url><url><loc>https://www.crace.io/default-risk-database-details/persistent-user-tracking-via-leaked-device-identifiers/r/recPTP7Fum6AYXqSe</loc></url><url><loc>https://www.crace.io/default-risk-database-details/call%2Fmessage-flooding-%28tdos%29-in-a-communication-app/r/recSUabLmtjgsNl4s</loc></url><url><loc>https://www.crace.io/default-risk-database-details/theft-of-electricity-via-hacked-ev-charger-software/r/reclZeirG1knbBFFt</loc></url><url><loc>https://www.crace.io/default-risk-database-details/reputational-damage-via-annoying-manipulation-of-hvac/r/recR5WIl97TQC1CZP</loc></url><url><loc>https://www.crace.io/default-risk-database-details/regular-expression-denial-of-service-%28redos%29/r/recJBBycr5jbHyOy3</loc></url><url><loc>https://www.crace.io/default-risk-database-details/loss-of-access-to-critical-data-when-subscription-payment-fails/r/recQTZ38UnenOag9R</loc></url><url><loc>https://www.crace.io/default-risk-database-details/social-engineering-of-developer-to-commit-malicious-code/r/recmb4D4HfowJsH51</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-via-mqtt-%22connect-flood%22-attack/r/recBFIL1CKKuN0bce</loc></url><url><loc>https://www.crace.io/default-risk-database-details/idor-leads-to-unauthorized-access-to-other-users%27-pii/r/recs5D0HZL1hkbPbj</loc></url><url><loc>https://www.crace.io/default-risk-database-details/drive-by-download-via-malicious-ad/r/recswWIdNHJHhbAx2</loc></url><url><loc>https://www.crace.io/default-risk-database-details/infrastructure-failure-due-to-attack-on-monitoring-software/r/recfuZavTGVOPSm4x</loc></url><url><loc>https://www.crace.io/default-risk-database-details/authentication-bypass-via-mass-assignment-vulnerability/r/recAx3HK9soRgPi44</loc></url><url><loc>https://www.crace.io/default-risk-database-details/privilege-escalation-via-vulnerable-remote-shell/r/recKrAQGp1Mpqo9jw</loc></url><url><loc>https://www.crace.io/default-risk-database-details/amplified-incident-impact-due-to-failure-of-paging%2Falerting-software/r/recjT0H1nxn9gxJLF</loc></url><url><loc>https://www.crace.io/default-risk-database-details/crop-destruction-via-hacked-irrigation-system/r/rec0vSSUn5jsTLCTi</loc></url><url><loc>https://www.crace.io/default-risk-database-details/malicious-code-injection-via-insecure-ci%2Fcd-webhook/r/recEkPBFONonW0lUy</loc></url><url><loc>https://www.crace.io/default-risk-database-details/vehicle-theft-via-relay-attack-on-keyless-entry-system/r/rec5AJjZXwrQeVD7y</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-decryption-due-to-predictable-initialization-vector-%28iv%29-in-cbc-mode/r/recePhSrkQJXTwNW1</loc></url><url><loc>https://www.crace.io/default-risk-database-details/weak-random-number-generation-for-cryptographic-keys/r/recq0yw6GYNdGsH5g</loc></url><url><loc>https://www.crace.io/default-risk-database-details/unauthorized-physical-entry-via-hacked-smart-lock-software/r/recdThCKoiIgSQGKx</loc></url><url><loc>https://www.crace.io/default-risk-database-details/arbitrary-code-execution-via-insecure-python-pickle-deserialization/r/recZvuwqNeC7UOrOS</loc></url><url><loc>https://www.crace.io/default-risk-database-details/update-process-downgrade-attack/r/reccGPeuq2kEOq83Z</loc></url><url><loc>https://www.crace.io/default-risk-database-details/firmware-overwriting-via-unprotected-memory-access/r/recEf6mtn8IsbJLin</loc></url><url><loc>https://www.crace.io/default-risk-database-details/improper-handling-and-exposure-of-data-of-minors/r/recxaeJQMRz1BH3uk</loc></url><url><loc>https://www.crace.io/default-risk-database-details/evasion-of-content-moderation-via-obfuscated-text-in-chat/r/recgwNHe0mMYlmO88</loc></url><url><loc>https://www.crace.io/default-risk-database-details/industrial-process-disruption-via-unauthenticated-modbus-commands/r/receNlAu7GgLwYoQV</loc></url><url><loc>https://www.crace.io/default-risk-database-details/permanent-denial-of-service-via-jwt-blacklist-exhaustion/r/reccQmzRaosIpfFMa</loc></url><url><loc>https://www.crace.io/default-risk-database-details/timing-attack-to-enumerate-data/r/recs9jZNWFImihaDB</loc></url><url><loc>https://www.crace.io/default-risk-database-details/ransomware-attack-via-unsandboxed-filesystem-access/r/rec6LZcZGRxjBTlvB</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-tampering-via-second-order-sql-injection/r/recevEGp5x2iUhCUs</loc></url><url><loc>https://www.crace.io/default-risk-database-details/logic-bomb-in-a-malicious-script-or-macro/r/recq3Buiox6SN15As</loc></url><url><loc>https://www.crace.io/default-risk-database-details/application-layer-denial-of-service-via-asymmetric-resource-consumption/r/rec8dOXgmwgpGPVXY</loc></url><url><loc>https://www.crace.io/default-risk-database-details/uncontrolled-resource-consumption-by-a-background-service/r/recTGdGNKq1FigKLO</loc></url><url><loc>https://www.crace.io/default-risk-database-details/weak-jwt-secret-key-allows-offline-cracking/r/recux5dA5uwWIZaIJ</loc></url><url><loc>https://www.crace.io/default-risk-database-details/exposure-of-unencrypted-financial-data-in-a-memory-dump/r/recdOPfR68mfz1VSk</loc></url><url><loc>https://www.crace.io/default-risk-database-details/disabling-of-a-safety-alarm-system-before-a-physical-event/r/reco7olEF9epUTMxw</loc></url><url><loc>https://www.crace.io/default-risk-database-details/credential-stuffing-attack-leading-to-mass-account-takeover/r/recFJQmEwu2Ypg2Ck</loc></url><url><loc>https://www.crace.io/default-risk-database-details/command-injection-via-malicious-filename-in-scp%2Fsftp/r/recJRedX14M3HWeg5</loc></url><url><loc>https://www.crace.io/default-risk-database-details/property-damage-via-malicious-control-of-hvac-system/r/rec2QVqGuJKZ43F08</loc></url><url><loc>https://www.crace.io/default-risk-database-details/user-profiling-via-hardware-fingerprinting/r/recU25lSlpgEa7ICy</loc></url><url><loc>https://www.crace.io/default-risk-database-details/system-instability-%28denial-of-service%29-via-malformed-input-to-driver/r/recJaKlnPwwiCRML0</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-tampering-via-unauthenticated-ftp-server/r/recUNq1OVKIb60oO7</loc></url><url><loc>https://www.crace.io/default-risk-database-details/session-fixation-attack/r/recCKK40WcnfgqnAk</loc></url><url><loc>https://www.crace.io/default-risk-database-details/device-bricking-via-malicious-usb-command/r/rec2J9jlxfHHg5fAo</loc></url><url><loc>https://www.crace.io/default-risk-database-details/user-impersonation-via-re-use-of-cryptographic-nonce/r/recuyKfVypRE5Qn1S</loc></url><url><loc>https://www.crace.io/default-risk-database-details/information-disclosure-via-unauthenticated-mqtt-broker/r/recqyBRlfkNtfMw9X</loc></url><url><loc>https://www.crace.io/default-risk-database-details/reflected-cross-site-scripting-%28xss%29-via-unvalidated-url-parameter/r/recuZz3T6qwsk8y4F</loc></url><url><loc>https://www.crace.io/default-risk-database-details/javascript-prototype-pollution-in-a-web-framework/r/rec0rzSNG9dBJbvQH</loc></url><url><loc>https://www.crace.io/default-risk-database-details/griefing-and-unfair-advantage-in-games-via-lag-switching/r/recl1xGYrBsuqUQep</loc></url><url><loc>https://www.crace.io/default-risk-database-details/sensitive-data-leakage-via-verbose-error-messages/r/recBTN7AsWr1dTTaB</loc></url><url><loc>https://www.crace.io/default-risk-database-details/exploitation-via-vulnerability-in-a-transitive-dependency/r/recjWsRMXenE4KIow</loc></url><url><loc>https://www.crace.io/default-risk-database-details/harassment-via-hacked-smart-doorbell/r/recF5JCZvfr8Dc2eT</loc></url><url><loc>https://www.crace.io/default-risk-database-details/mass-identity-theft-via-compromised-government-service-portal/r/recTJSdtSbQWiznP3</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-via-malformed-debug-information-in-an-ide/r/recuRPSRKbeilXcC8</loc></url><url><loc>https://www.crace.io/default-risk-database-details/unauthorized-access-to-health-data-via-weak-access-control/r/recw4h2j5wgPsA6yL</loc></url><url><loc>https://www.crace.io/default-risk-database-details/widespread-malware-distribution-via-compromised-automated-updater/r/recSGGoRCfHxW3pAT</loc></url><url><loc>https://www.crace.io/default-risk-database-details/persistence-via-malicious-browser-extension/r/recyhNkastmCKhlVY</loc></url><url><loc>https://www.crace.io/default-risk-database-details/financial-loss-via-hacked-energy-trading-software/r/recEApO7R24S81Xod</loc></url><url><loc>https://www.crace.io/default-risk-database-details/sql-injection-leading-to-financial-database-exfiltration/r/recQiZ2cPYr6XZD5P</loc></url><url><loc>https://www.crace.io/default-risk-database-details/cryptomining-via-malicious-browser-extension/r/recnnln3P3P1oJyQM</loc></url><url><loc>https://www.crace.io/default-risk-database-details/logic-flaw-in-game-script-allows-item-duplication/r/rec0Nzmuckmc2km83</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-via-infinite-loop-in-application-profiler/r/recnGgRopVTApMmJy</loc></url><url><loc>https://www.crace.io/default-risk-database-details/typosquatting-attack-in-public-package-repository/r/rec3lNh4QCHFq739K</loc></url><url><loc>https://www.crace.io/default-risk-database-details/path-traversal-attack-to-read-arbitrary-files/r/recrJ1jYR6HnEzjtZ</loc></url><url><loc>https://www.crace.io/default-risk-database-details/compromise-of-financial-data-via-unencrypted-transmission/r/recP2kMPoXsJbOoZc</loc></url><url><loc>https://www.crace.io/default-risk-database-details/xml-external-entity-%28xxe%29-injection-via-file-upload/r/recXpbxZAmxtKXKVN</loc></url><url><loc>https://www.crace.io/default-risk-database-details/persistent-vulnerability-due-to-statically-linked-library/r/recD9Pid2mT0MrOsD</loc></url><url><loc>https://www.crace.io/default-risk-database-details/dns-rebinding-attack-to-bypass-firewall/r/rec4vbV686nqUc4qd</loc></url><url><loc>https://www.crace.io/default-risk-database-details/privilege-escalation-via-insecure-service-permissions/r/recf22BKAn6wSyGSc</loc></url><url><loc>https://www.crace.io/default-risk-database-details/arbitrary-code-execution-via-vulnerability-in-common-system-library/r/recylo6fooEAxvo6O</loc></url><url><loc>https://www.crace.io/default-risk-database-details/covert-eavesdropping-via-compromised-application-with-microphone-access/r/recO8RQHfYp7uiVc7</loc></url><url><loc>https://www.crace.io/default-risk-database-details/clickjacking-attack-to-perform-unauthorized-actions/r/recFdFn1S2ZwWJ5XS</loc></url><url><loc>https://www.crace.io/default-risk-database-details/misdiagnosis-due-to-tampered-medical-imaging-software/r/recgSh6OwBvUCpuZu</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-leakage-via-insecure-plugin-data-handling/r/recJM8s9o5RWcyLY0</loc></url><url><loc>https://www.crace.io/default-risk-database-details/ip-theft-via-malicious-cad-plugin/r/recgogEimVMnWehkd</loc></url><url><loc>https://www.crace.io/default-risk-database-details/malvertising-campaign-leading-to-widespread-phishing/r/recsgRfgJkrOg7g8i</loc></url><url><loc>https://www.crace.io/default-risk-database-details/insecure-deserialization-leading-to-remote-code-execution/r/rec97dOp2Y4pYM8TE</loc></url><url><loc>https://www.crace.io/default-risk-database-details/ip-theft-via-vulnerable-cad-software/r/recW2ixJiQCJrMiDV</loc></url><url><loc>https://www.crace.io/default-risk-database-details/unauthorized-cross-tenant-data-access-in-a-multi-tenant-environment/r/recXC7l6BiTspYSEU</loc></url><url><loc>https://www.crace.io/default-risk-database-details/physical-harm-via-manipulation-of-medical-infusion-pump/r/recYkHBe0KPoSXfxU</loc></url><url><loc>https://www.crace.io/default-risk-database-details/insecure-tls-configuration-allows-downgrade-attack/r/recPLM4lnKBt1YoMb</loc></url><url><loc>https://www.crace.io/default-risk-database-details/panic-and-disruption-via-false-activation-of-public-alarm-system/r/receccYnDRcaMu3Gs</loc></url><url><loc>https://www.crace.io/default-risk-database-details/ransomware-via-malicious-office-macro/r/recu7Vznx7Zm6KOVK</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-attack-on-keyless-entry-system-during-emergency/r/rec9m5jlgShTnvYGH</loc></url><url><loc>https://www.crace.io/default-risk-database-details/traffic-disruption-via-hacked-traffic-light-control-system/r/recGcWZlCpMBChuxC</loc></url><url><loc>https://www.crace.io/default-risk-database-details/permanent-data-loss-via-malicious-file-upload-with-destructive-payload/r/recJFomaEap76Ek71</loc></url><url><loc>https://www.crace.io/default-risk-database-details/application-piracy-via-flawed-client-side-license-check/r/recJeVHFwz5AHNFlK</loc></url><url><loc>https://www.crace.io/default-risk-database-details/server-side-template-injection-leading-to-rce/r/recKTfsHFe0B3xdxs</loc></url><url><loc>https://www.crace.io/default-risk-database-details/remote-code-execution-via-maliciously-crafted-file/r/recMxbOqkKkVXFEgj</loc></url><url><loc>https://www.crace.io/default-risk-database-details/insecure-direct-object-reference-%28idor%29-on-session-management/r/recNhaJBU2mjCAxDq</loc></url><url><loc>https://www.crace.io/default-risk-database-details/ransomware-deployment-via-compromised-ci%2Fcd-pipeline/r/recSA7brhJlHNnE1x</loc></url><url><loc>https://www.crace.io/default-risk-database-details/keystroke-injection-via-vulnerable-background-service-with-ui-access/r/recLAj7Kzt4ry6FmY</loc></url><url><loc>https://www.crace.io/default-risk-database-details/http-parameter-pollution-for-application-logic-bypass/r/recRPTG3tfeM1LmMQ</loc></url><url><loc>https://www.crace.io/default-risk-database-details/time-of-check-to-time-of-use-%28toctou%29-race-condition/r/recewcZnGoOZmF5S6</loc></url><url><loc>https://www.crace.io/default-risk-database-details/information-disclosure-via-padding-oracle-attack/r/reclBdRxAPk5Apvip</loc></url><url><loc>https://www.crace.io/default-risk-database-details/exploitation-of-known-vulnerability-in-an-unpatched-foundational-framework/r/recXguN8sUxepVSWp</loc></url><url><loc>https://www.crace.io/default-risk-database-details/disruption-of-emergency-services-via-attack-on-paging-system/r/recfiTrabwJ6BR3lF</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-for-paying-customers-via-flawed-license-check/r/recyCVPbuPRsVTUXD</loc></url><url><loc>https://www.crace.io/default-risk-database-details/improper-asset-management-leads-to-sensitive-data-in-old-backups/r/recRAj3YhfPKjI1ox</loc></url><url><loc>https://www.crace.io/default-risk-database-details/unauthorized-pairing-via-lack-of-user-interaction-in-bluetooth-le/r/recgAaUL3nPQB5A1a</loc></url><url><loc>https://www.crace.io/default-risk-database-details/supply-chain-attack-via-compromised-compiler/r/recetAbwNRHYds3Yy</loc></url><url><loc>https://www.crace.io/default-risk-database-details/theft-of-proprietary-source-code-from-publicly-exposed-repository/r/rec47phJsBWSLmKUM</loc></url><url><loc>https://www.crace.io/default-risk-database-details/stored-cross-site-scripting-%28xss%29-via-user-generated-text/r/recmCs6SLzpVIaFBJ</loc></url><url><loc>https://www.crace.io/default-risk-database-details/grid-destabilization-via-synchronized-attack-on-smart-inverters/r/rec6Ur7oDaAfkGeyo</loc></url><url><loc>https://www.crace.io/default-risk-database-details/malware-distribution-via-malicious-file-upload/r/recW1WOPXZzOyrt0h</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-via-system-clock-manipulation/r/recn721u3uEXOhECY</loc></url><url><loc>https://www.crace.io/default-risk-database-details/location-tracking-via-bluetooth-le-mac-address/r/recbwIWBpMLAU6gra</loc></url><url><loc>https://www.crace.io/default-risk-database-details/password-hashes-cracked-due-to-weak-hashing-algorithm/r/recIm2txak0FEI7WG</loc></url><url><loc>https://www.crace.io/default-risk-database-details/man-in-the-middle-attack-on-insecure-bluetooth-pairing/r/recdQZWEeo7bjZAgI</loc></url><url><loc>https://www.crace.io/default-risk-database-details/session-token-leakage-via-referer-header/r/recx9rgeyv4AFn2Re</loc></url><url><loc>https://www.crace.io/default-risk-database-details/compromise-of-third-party-service-via-leaked-api-key-in-client-side-code/r/recrEViINedoYTm6S</loc></url><url><loc>https://www.crace.io/default-risk-database-details/http-request-smuggling/r/recxPEDrWl6momAW4</loc></url><url><loc>https://www.crace.io/default-risk-database-details/message-injection-and-impersonation-in-an-insecure-mqtt-topic/r/recFMx0o764OoCP2N</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-corruption-via-unsanitized-input-to-a-file-write-operation/r/recchuRFgk8cuGV9D</loc></url><url><loc>https://www.crace.io/default-risk-database-details/health-hazard-via-malicious-control-of-hospital-hvac/r/reczExN04mAVvcCHV</loc></url><url><loc>https://www.crace.io/default-risk-database-details/memory-scraping-via-compromised-application-profiler/r/recCaA8XRr35H3usH</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-exfiltration-via-dns-tunneling/r/recGwdPJKq7ODp8as</loc></url><url><loc>https://www.crace.io/default-risk-database-details/competitive-advantage-through-application-profiling/r/recIQxml9W5lqqwoA</loc></url><url><loc>https://www.crace.io/default-risk-database-details/blackout-via-coordinated-attack-on-power-grid-software/r/rec2Ryp1q1rIvgzNZ</loc></url><url><loc>https://www.crace.io/default-risk-database-details/financial-fraud-via-hacked-home-assistant-with-voice-purchasing/r/recB8omsU3cli7oxr</loc></url><url><loc>https://www.crace.io/default-risk-database-details/keystroke-logging-via-compromised-behavioral-tracking-script/r/recVJnDgSL3r61mbm</loc></url><url><loc>https://www.crace.io/default-risk-database-details/session-hijacking-via-leaked-session-token-in-logs/r/recAWrhQKhOUan7JC</loc></url><url><loc>https://www.crace.io/default-risk-database-details/permanent-data-loss-via-unsanitized-input-to-a-deletion-command/r/recYCeygHLPyF88mY</loc></url><url><loc>https://www.crace.io/default-risk-database-details/coercion-via-covert-recording-with-device-camera/r/recaL0rSsRlRL2mOJ</loc></url><url><loc>https://www.crace.io/default-risk-database-details/exposure-of-credit-card-cvv-numbers-in-logs/r/recAsYsZDz2boDjNX</loc></url><url><loc>https://www.crace.io/default-risk-database-details/user-identification-via-browser-fingerprinting/r/recAg2bYt7NYxrRAm</loc></url><url><loc>https://www.crace.io/default-risk-database-details/information-leakage-via-compiler-optimization/r/recDZWFtrKunGbYqg</loc></url><url><loc>https://www.crace.io/default-risk-database-details/billion-laughs-attack-via-xml-parser/r/recL5Ycxz3EQbuzOx</loc></url><url><loc>https://www.crace.io/default-risk-database-details/data-exfiltration-via-out-of-band-methods-using-rsync-features/r/rec9ZZ6aiW03YX2Re</loc></url><url><loc>https://www.crace.io/default-risk-database-details/sensitive-data-exposure-via-insecure-temporary-files/r/recZsFez17Zl8RKV5</loc></url><url><loc>https://www.crace.io/default-risk-database-details/slowloris-denial-of-service-attack/r/rec7WoBqIoN0jk4Ux</loc></url><url><loc>https://www.crace.io/default-risk-database-details/privacy-breach-via-misconfigured-cors/r/rec5IQLKufelqixSr</loc></url><url><loc>https://www.crace.io/default-risk-database-details/sabotage-of-automated-farm-via-hacked-utility-system/r/recSUluaafG8P2VjR</loc></url><url><loc>https://www.crace.io/default-risk-database-details/information-leak-via-jit-compiler-side-channel/r/recuAO7zliuh6HMhm</loc></url><url><loc>https://www.crace.io/default-risk-database-details/os-fingerprinting-via-analysis-of-unique-identifier-generation/r/recbTWvCtZ9TZODxT</loc></url><url><loc>https://www.crace.io/default-risk-database-details/username-enumeration-via-self-registration-form/r/recnuA7GpGjVdnHHN</loc></url><url><loc>https://www.crace.io/default-risk-database-details/dll-hijacking-to-achieve-persistence-and-privilege-escalation/r/recpdOAJn6ubaJ2w2</loc></url><url><loc>https://www.crace.io/default-risk-database-details/system-compromise-via-malicious-ide-plugin/r/recNizKEmaR7iiJqh</loc></url><url><loc>https://www.crace.io/default-risk-database-details/zero-day-exploit-in-a-foundational-game-engine/r/recotQ4frIhMvWBdK</loc></url><url><loc>https://www.crace.io/default-risk-database-details/widespread-anxiety-by-hacking-into-emergency-alert-system-%28eas%29/r/recXitOhyRvuZtcVu</loc></url><url><loc>https://www.crace.io/default-risk-database-details/http-host-header-injection/r/recEDDjHaQxNcKKWt</loc></url><url><loc>https://www.crace.io/default-risk-database-details/arbitrary-file-write-via-path-traversal-in-plugin%27s-zip-extraction/r/rec86XodwIgs92kDS</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-access-via-ransomware-on-smart-lock/r/recpUPp1t1yprHIgJ</loc></url><url><loc>https://www.crace.io/default-risk-database-details/denial-of-service-via-resource-exhaustion-of-a-network-facing-service/r/recC2cyLqejoVp9qj</loc></url><url><loc>https://www.crace.io/default-risk-database-details/code-leakage-via-vulnerable-ide-feature/r/recPV03BCeIRdiq36</loc></url><url><loc>https://www.crace.io/default-risk-database-details/full-system-compromise-via-vulnerability-in-privileged-application/r/recWlWVloVtvySVVm</loc></url><url><loc>https://www.crace.io/default-risk-database-details/authentication-bypass-due-to-response-discrepancy/r/rec3q7LTCXpSxBrWI</loc></url><url><loc>https://www.crace.io/default-risk-database-details/oauth-consent-grant-phishing-for-third-party-account-takeover/r/rec5llN7eH7kU8F7B</loc></url><url><loc>https://www.crace.io/default-risk-database-details/theft-of-biometric-template-data-from-insecure-storage/r/recAM67gCGJVKUr2u</loc></url><url><loc>https://www.crace.io/default-risk-database-details/exploitation-of-hardcoded-credentials-in-statically-linked-application/r/rec0utIylR3Gy2Crc</loc></url><url><loc>https://www.crace.io/default-risk-database-details/open-redirect-vulnerability-aids-phishing-campaigns/r/recJ2Bhsl15EQHGPk</loc></url><url><loc>https://www.crace.io/default-risk-database-details/sensitive-data-exposure-in-publicly-accessible-cloud-storage/r/reczbIQK3ZoKMSGCX</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-woo-marketplace/r/recMBdIQJRrIB61Om</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-zapier-apps/r/recWC1c2MiBvGoV7d</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-browser-plugins/r/rec7nBJU5HEqdqIuu</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-ios-apps/r/recyoQbEwGAb5Ejfp</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-zendesk-marketplace/r/recdgFWXbfWJ19gum</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-hubspot-apps/r/recxyOZrHprMs8rqS</loc></url><url><loc>https://www.crace.io/knowledge-base-details/the-wordpress-plugin-marketplace%3A-navigating-the-cra%27s-impact/r/recgkH3YBKzdQzXag</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-article-13%3A-your-software-risk-assessment-rulebook/r/recK6YiLv69WHmEE9</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-zoom-app-marketplace/r/rec6traOO6jDh8UYU</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-monday-marketplace/r/rec6rcizvtETqvnqa</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-atlassian-marketplace/r/recWuMHpyjpNgMnL9</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-airtable-extensions/r/recnf7Mk4feimMwKS</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-filament-plugins/r/recnEyJXTIt089fut</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-npm-packages/r/reczvxgGyzqbsJUHy</loc></url><url><loc>https://www.crace.io/knowledge-base-details/why-a-cybersecurity-risk-assessment-is-crucial-for-your-software-under-cra/r/recsXOFES544VzdNy</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-shopify-app-store/r/recaK5zYfeNgecMsB</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-salesforce-appexchange/r/recmFk37pTLmb1R1R</loc></url><url><loc>https://www.crace.io/knowledge-base-details/the-eu-declaration-of-conformity-%28doc%29-for-software%3A-purpose-and-importance/r/recqo4OUCGXf2HfC6</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-microsoft-appsource-%2F-teams-app-store/r/recLL1lHWL4E9j2Rj</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-website-themes/r/recpHfnmifHLsoSQi</loc></url><url><loc>https://www.crace.io/knowledge-base-details/navigating-the-eu-cyber-resilience-act-for-your-docker-images%3A-your-software%27s-new-cybersecurity-obligation/r/recQThHIfLR4uBYAO</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-wix-app-market/r/recwz7NfjcACtagOk</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-google-workspace-marketplace/r/recpBGFuoc4DrjeI2</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-bigcommerce-apps/r/recvUI2UGFc0kFlgP</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cyber-resilience-act-%28cra%29-and-github-actions/r/recNscxPqKOMNrETN</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-google-play-apps/r/recL3Mn6fhkYYt6gq</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-miro-apps-marketplace/r/recchq3JmErj1B6jF</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-servicenow-store/r/recCMOhgFKkoPVvN9</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-asana-app-directory/r/recZsi3JpDj7uhnAQ</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-and-slack-app-directory/r/recsW3z9AahhNUcjB</loc></url><url><loc>https://www.crace.io/knowledge-base-details/cra-compliance-for-your-magneto-marketplace-app%3A-a-deliverables-checklist-for-developers/r/rec2JdHTlrNN53Iux</loc></url></urlset>