<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/praisonai-has-critical-rce-via-type-job-workflow</loc>
    <news:news>
      <news:publication>
        <news:name>LaAutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T20:14:27.791Z</news:publication_date>
      <news:title>PraisonAI vulnerable a RCE crítica mediante archivos YAML de workflow con type: job</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/vikunja-has-totp-twofactor-authentication-bypass-via-oidc</loc>
    <news:news>
      <news:publication>
        <news:name>LaAutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T14:39:10.865Z</news:publication_date>
      <news:title>Vikunja permite bypass de autenticación TOTP mediante login OIDC</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/noticia/tribunal-apelaciones-sanciona-abogados-citar-casos</loc>
    <news:news>
      <news:publication>
        <news:name>LaAutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T13:54:07.745Z</news:publication_date>
      <news:title>Tribunal de Apelaciones sanciona a abogados por citar casos falsos generados por IA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/langsmith-client-sdks-has-prototype-pollution-in-langsmithsdk</loc>
    <news:news>
      <news:publication>
        <news:name>LaAutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T23:53:04.387Z</news:publication_date>
      <news:title>Prototype Pollution en langsmith-sdk permite contaminación de Object.prototype via constructor.prototype</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/rembg-has-a-path-traversal-via-custom-model</loc>
    <news:news>
      <news:publication>
        <news:name>LaAutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T23:12:46.195Z</news:publication_date>
      <news:title>Rembg permite path traversal via carga de modelos personalizados en servidor HTTP</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/noticia/hombre-florida-usa-deepfake-denunciar-falsamente</loc>
    <news:news>
      <news:publication>
        <news:name>LaAutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T21:33:45.777Z</news:publication_date>
      <news:title>Un hombre de Florida usa un deepfake para denunciar falsamente el robo de un coche patrulla</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/paperclip-vulnerable-to-unauthenticated-remote-code-execution-via</loc>
    <news:news>
      <news:publication>
        <news:name>LaAutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T20:28:25.095Z</news:publication_date>
      <news:title>Paperclip permite ejecución remota de código sin autenticación mediante bypass de autorización en importación</news:title>
    </news:news>
  </url>
</urlset>