<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/24/</loc>
  </url><url>
    <loc>https://code-white.com/careers/challenge/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/23/</loc>
  </url><url>
    <loc>https://code-white.com/careers/redteamer/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/22/</loc>
  </url><url>
    <loc>https://code-white.com/careers/pentester/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/21/</loc>
  </url><url>
    <loc>https://code-white.com/careers/nday-researcher/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/20/</loc>
  </url><url>
    <loc>https://code-white.com/careers/vulnerability-intelligence-analyst/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/19/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/18/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/17/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/16/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/15/</loc>
  </url><url>
    <loc>https://code-white.com/rss/index.xml/</loc>
  </url><url>
    <loc>https://code-white.com/start/start-start/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/14/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/13/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/12/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/11/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/10/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/9/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/8/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/7/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/6/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/5/</loc>
  </url><url>
    <loc>https://code-white.com/rss/blog/index.xml/</loc>
  </url><url>
    <loc>https://code-white.com/start/intelligence-driven-security/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/4/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/3/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/2/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/1/</loc>
  </url><url>
    <loc>https://code-white.com/start/initial-assessment/</loc>
  </url><url>
    <loc>https://code-white.com/start/security-intelligence-service/</loc>
  </url><url>
    <loc>https://code-white.com/start/about-us/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticationserviceforceresetpassword-missing-authentication-in-smartermail/</loc>
    <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/</loc>
    <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/</loc>
    <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/markus-wulftange/</loc>
    <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/</loc>
    <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/systemadminsettingscontrollerconnecttohub-missing-authentication-in-smartermail/</loc>
    <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/</loc>
    <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/vulnerability/</loc>
    <lastmod>2026-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/cves/cve-2025-34164/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/cves/cve-2025-34165/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/cves/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/exploitation/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/fabian-weber/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2026-01-nsm-rce/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/vulnerability-details/</loc>
    <lastmod>2026-01-13T12:11:59+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/fabian-weber/</loc>
    <lastmod>2025-12-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/florian-hauser/</loc>
    <lastmod>2025-12-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/multiple-vulnerabilities-in-abl90-flex-plus/</loc>
    <lastmod>2025-12-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/multiple-vulnerabilities-in-netsupport-manager/</loc>
    <lastmod>2025-11-03T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/wsus-cve-2025-59287-analysis/</loc>
    <lastmod>2025-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/cves/cve-2025-59287/</loc>
    <lastmod>2025-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/markus-wulftange/</loc>
    <lastmod>2025-10-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/reporting-web-service-reportingevent-soapformatter-deserialization-in-windows-se/</loc>
    <lastmod>2025-10-23T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/mount-service-deserialization-via-net-remoting-client-in-backup-replication/</loc>
    <lastmod>2025-10-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/local-privilege-escalation-in-intensive-care-manager-icm/</loc>
    <lastmod>2025-07-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/multiple-vulnerabilities-in-onlinesuite/</loc>
    <lastmod>2025-06-23T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/remote-code-execution-via-deserialization-of-untrusted-data-in-backup-replicat/</loc>
    <lastmod>2025-06-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/daniel-k%C3%BCppers/</loc>
    <lastmod>2025-05-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-via-deserialization-of-untrusted-data-in-m/</loc>
    <lastmod>2025-05-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/ivanti-desktop-and-server-management/</loc>
    <lastmod>2025-05-12T12:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/code-white/</loc>
    <lastmod>2025-05-12T12:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/cves/cve-2023-28129/</loc>
    <lastmod>2025-05-12T12:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/exploitation-technique/</loc>
    <lastmod>2025-05-12T12:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/jakob-heusinger/</loc>
    <lastmod>2025-05-12T12:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/tobias-neitzel/</loc>
    <lastmod>2025-05-12T12:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/multiple-vulnerabilities-in-gfi-mailessentials/</loc>
    <lastmod>2025-04-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/patrick-hener/</loc>
    <lastmod>2025-04-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-serverside-templateinjection-in-metazo/</loc>
    <lastmod>2025-04-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/defaultresourcelocator-absolute-path-traversal-in-activereports-net/</loc>
    <lastmod>2025-02-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/reportfileresolver-absolute-path-traversal-in-telerik-reporting/</loc>
    <lastmod>2025-02-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/spthemebackgroundimageuri-relative-path-traversal-in-sharepoint/</loc>
    <lastmod>2024-12-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/multiple-vulnerabilities-in-syncfusion-asp-net-mvc/</loc>
    <lastmod>2024-11-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/moritz-oehrlein/</loc>
    <lastmod>2024-11-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-via-known-view-state-secret-in-fieldpie/</loc>
    <lastmod>2024-11-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/sequenceexternalizable-arbitrary-deserialization-in-weblogic-server/</loc>
    <lastmod>2024-10-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/entitydatasource-insecure-type-resolution-in-telerik-report-server/</loc>
    <lastmod>2024-09-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/entitydatasource-insecure-type-resolution-in-telerik-reporting/</loc>
    <lastmod>2024-09-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/insecure-expression-evaluation-in-telerik-reporting/</loc>
    <lastmod>2024-09-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-backup-replication/</loc>
    <lastmod>2024-09-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-content-injection-in-openedge-management/</loc>
    <lastmod>2024-08-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/accessible-logs-in-spectrum/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-xxe-in-spectrum/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authentication-bypass-in-spectrum/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/deserialization-of-untrusted-data-in-spectrum/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/hardcoded-not-changable-credentials-in-spectrum/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/nikolas-sotiriu/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/serverside-request-forgery-testdataservicerequest-in-spectrum/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/serverside-request-forgery-testdeviceconnection-in-spectrum/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unprotected-jmx-registry-in-spectrum/</loc>
    <lastmod>2024-08-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/teaching-the-old-net-remoting-new-exploitation-tricks/</loc>
    <lastmod>2024-07-31T00:00:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unknowntyperesolver-insecure-type-resolution-in-telerik-report-server/</loc>
    <lastmod>2024-07-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unknowntyperesolver-insecure-type-resolution-in-telerik-reporting/</loc>
    <lastmod>2024-07-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/preauth-insecure-deserialization-in-dynamics-365-business-central/</loc>
    <lastmod>2024-06-11T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/binaryserializervulnerabilityfilter-bypass-in-service-provider-console/</loc>
    <lastmod>2024-05-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/florian-roth/</loc>
    <lastmod>2024-04-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/insecure-net-remoting-in-project-center-server/</loc>
    <lastmod>2024-04-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-sql-injection-in-smartfactory-shopfloor-guide/</loc>
    <lastmod>2024-04-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/http-net-remoting-objref-leak-in-net-framework/</loc>
    <lastmod>2024-03-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting/</loc>
    <lastmod>2024-02-27T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/ssrf-netntlm-leaks-in-tableau-server/</loc>
    <lastmod>2024-02-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authentication-bypass-in-ai-box/</loc>
    <lastmod>2023-12-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/preauthenticated-xxe-in-cctv-with-observer/</loc>
    <lastmod>2023-12-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/jndi-injection-in-pentaho-business-analytics-server/</loc>
    <lastmod>2023-12-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-remote-code-execution-in-gridvis/</loc>
    <lastmod>2023-12-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/hardcoded-encryption-password-allows-for-authenticated-leak-of-cleartext-databas/</loc>
    <lastmod>2023-12-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/local-privilege-escalation-in-visor-vision-sensors/</loc>
    <lastmod>2023-12-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-arbitrary-file-write-as-root-in-profinet-inspector-nt/</loc>
    <lastmod>2023-11-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-os-command-injection-in-profinet-inspector-nt/</loc>
    <lastmod>2023-11-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/security-feature-bypass-vulnerability-in-asp-net/</loc>
    <lastmod>2023-11-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-serverside-request-forgery-in-skype-for-business-server/</loc>
    <lastmod>2023-10-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/cves/cve-2023-33160/</loc>
    <lastmod>2023-09-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/exploiting-asp.net-templateparser-part-2/</loc>
    <lastmod>2023-09-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/gadget/</loc>
    <lastmod>2023-09-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/cves/cve-2023-35813/</loc>
    <lastmod>2023-09-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/exploiting-asp.net-templateparser-part-1/</loc>
    <lastmod>2023-09-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/apollon/</loc>
    <lastmod>2023-08-03T08:40:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/auditd/</loc>
    <lastmod>2023-08-03T08:40:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2023-08-blindsiding-auditd-for-fun-and-profit/</loc>
    <lastmod>2023-08-03T08:40:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/daphne/</loc>
    <lastmod>2023-08-03T08:40:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/laurel/</loc>
    <lastmod>2023-08-03T08:40:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/linux/</loc>
    <lastmod>2023-08-03T08:40:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/local-privilege-escalation-in-ivanti-desktop-and-server-management/</loc>
    <lastmod>2023-07-26T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/tobias-neitzel/</loc>
    <lastmod>2023-07-26T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/arbitrary-java-el-execution-in-workspace/</loc>
    <lastmod>2023-07-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/matteo-tomaselli/</loc>
    <lastmod>2023-07-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/sppageparserfilter-bypass-in-sharepoint/</loc>
    <lastmod>2023-07-11T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/dot-net-remoting/</loc>
    <lastmod>2023-07-10T08:17:48+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/florian-hauser/</loc>
    <lastmod>2023-07-10T08:17:48+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2023-07-from-blackbox-dotnet-remoting-to-rce/</loc>
    <lastmod>2023-07-10T08:17:48+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/data-source-protection-bypass-during-xml-deserialization-in-devexpress/</loc>
    <lastmod>2023-06-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/exposed-dangerous-method-or-function-in-experience-manager-experience-platform/</loc>
    <lastmod>2023-06-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/insecure-arbitrary-typeconverter-conversion-in-devexpress/</loc>
    <lastmod>2023-06-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/missing-protection-of-xtrareport-serialized-data-in-aspnet-web-forms-in-devexpre/</loc>
    <lastmod>2023-06-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/serverside-request-forgery-via-asyncdownloader-in-devexpress/</loc>
    <lastmod>2023-06-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/deserialization-of-untrusted-data-in-pentaho-business-analytics-server/</loc>
    <lastmod>2023-05-24T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-arbitrary-file-read-as-system-in-mcl-net/</loc>
    <lastmod>2023-04-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/java/</loc>
    <lastmod>2023-04-11T17:03:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2023-04-java-exploitation-restrictions-in-modern-jdk-times/</loc>
    <lastmod>2023-04-11T17:03:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/legacy-blogger/</loc>
    <lastmod>2023-04-11T17:03:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/external-control-of-the-system-or-configuration-settings-in-remote-application-s/</loc>
    <lastmod>2023-04-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/relative-path-traversal-in-remote-application-server/</loc>
    <lastmod>2023-04-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2023-03-jmx-exploitation-revisited/</loc>
    <lastmod>2023-03-20T12:05:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/multiple-vulnerabilities-unauthenticated-in-fortinac/</loc>
    <lastmod>2023-03-02T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/hardcoded-administrative-credentials-in-tg670-dsl-gateway-router/</loc>
    <lastmod>2023-02-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-goanywhere-mft/</loc>
    <lastmod>2023-02-02T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/multiple-vulnerabilities-in-tornado-server/</loc>
    <lastmod>2023-01-18T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-pgadmin-web-windows/</loc>
    <lastmod>2022-11-23T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-xxe-in-sophos-mobile/</loc>
    <lastmod>2022-11-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthorized-user-registration-in-apache-archiva/</loc>
    <lastmod>2022-10-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/lowpriv-user-stack-buffer-overflow-in-2fa-in-kerio-connect/</loc>
    <lastmod>2022-09-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2022-09-attacks-on-sysmon-revisited-sysmonente/</loc>
    <lastmod>2022-09-06T11:02:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/fabian-uhlich/</loc>
    <lastmod>2022-09-06T11:02:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/sebastian-feldmann/</loc>
    <lastmod>2022-09-06T11:02:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authentication-bypass-in-r1soft-server-backup-manager/</loc>
    <lastmod>2022-07-26T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-command-injection-in-app-platform-ap-manager/</loc>
    <lastmod>2022-07-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-command-injection-in-seppmail-appliance/</loc>
    <lastmod>2022-07-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/dennis-herrmann/</loc>
    <lastmod>2022-07-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2022-06-bypassing-dotnet-serialization-binders/</loc>
    <lastmod>2022-06-28T16:00:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-command-injection-in-edr-810-series/</loc>
    <lastmod>2022-06-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-command-injection-in-tn-5916-nat-router/</loc>
    <lastmod>2022-06-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authentication-bypass-in-tn-5916-nat-router/</loc>
    <lastmod>2022-06-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/simon-janz/</loc>
    <lastmod>2022-06-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remode-code-execution-in-grpc-interfaces-in-smarterstats/</loc>
    <lastmod>2022-06-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/kai-ullrich/</loc>
    <lastmod>2022-06-03T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/vulnerable-rmi-call-in-windchill-pdmlink/</loc>
    <lastmod>2022-06-03T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/requestdispatcher-local-file-inclusion-in-zk-framework/</loc>
    <lastmod>2022-05-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-phone-management-system/</loc>
    <lastmod>2022-02-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-storeever-esl-g3-tape-library/</loc>
    <lastmod>2022-02-08T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2022-01-dotnet-remoting-revisited/</loc>
    <lastmod>2022-01-27T15:49:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authentication-bypass-unauthenticated-root-password-reset-in-citrix-adm/</loc>
    <lastmod>2022-01-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/philipp-schmied/</loc>
    <lastmod>2022-01-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-service-shutdown-in-citrix-adm/</loc>
    <lastmod>2022-01-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-act-crm/</loc>
    <lastmod>2022-01-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/deserialization-protection-bypass-in-exchange-2013-2016-2019/</loc>
    <lastmod>2021-12-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-admira-arema/</loc>
    <lastmod>2021-11-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-tpt/</loc>
    <lastmod>2021-10-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-xxe-in-tibco-jasperreports-server/</loc>
    <lastmod>2021-10-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-rce-via-unsafe-cookie-deserialization-in-helpspot/</loc>
    <lastmod>2021-10-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2021-09-citrix-sharefile-rce-cve-2021-22941/</loc>
    <lastmod>2021-09-21T10:04:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/christian-f%C3%BCnfhaus/</loc>
    <lastmod>2021-09-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-in-jedox/</loc>
    <lastmod>2021-09-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in-cerberus-dsm-desigo-cc-desigo-cc-compact/</loc>
    <lastmod>2021-09-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/arbitrary-file-reading-via-hardcoded-crypto-key-in-storefront/</loc>
    <lastmod>2021-08-03T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/rce-via-arbitrary-class-execution-in-lobster-adminconsole/</loc>
    <lastmod>2021-07-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/local-privilege-escalation-to-system-in-aternity-agent/</loc>
    <lastmod>2021-06-18T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2021-06-about-unsuccessful-quest-for/</loc>
    <lastmod>2021-06-11T12:05:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/cves/cve-2021-21481/</loc>
    <lastmod>2021-06-11T12:05:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/kai-ullrich/</loc>
    <lastmod>2021-06-11T12:05:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/path-traversal-in-sharefile-storagezone-controller/</loc>
    <lastmod>2021-04-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-via-net-remoting-in-backup-replication/</loc>
    <lastmod>2021-01-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/several-unauthenticated-remote-code-executions-file-reads-and-writes-in-security/</loc>
    <lastmod>2020-12-08T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/various-vulnerabilities-file-read-file-write-sql-injection-xsl-transformation-da/</loc>
    <lastmod>2020-09-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/lfi-leads-to-rce-in-webconfig/</loc>
    <lastmod>2020-09-02T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/matteo-tomaselli/</loc>
    <lastmod>2020-07-13T16:46:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2020-07-sophos-xg-tale-of-unfortunate-re/</loc>
    <lastmod>2020-07-13T16:46:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/jakob-heusinger/</loc>
    <lastmod>2020-07-13T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/sql-injection-in-firewall-xg/</loc>
    <lastmod>2020-07-13T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-weblogic-server/</loc>
    <lastmod>2020-05-11T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/arbitrary-file-read-in-spring-web-mvc/</loc>
    <lastmod>2020-04-29T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-via-net-remoting-in-smarterstats/</loc>
    <lastmod>2020-04-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-access-to-encrypted-administration-credentials-in-dell-vxrail/</loc>
    <lastmod>2020-04-16T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-remote-code-execution-via-unsecure-java-deserialization-in-opennms/</loc>
    <lastmod>2020-04-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-change-of-system-configuration-via-unprotected-java-servlets-in/</loc>
    <lastmod>2020-04-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-via-unsecure-java-deserialization-in-hpe-i/</loc>
    <lastmod>2020-04-08T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/622-631-in-avalanche-data-repository-service/</loc>
    <lastmod>2020-04-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2020-03-liferay-portal-json-vulns/</loc>
    <lastmod>2020-03-20T13:31:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-portal/</loc>
    <lastmod>2020-03-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/arbitrary-file-upload-in-telerik-ui-for-silverlight/</loc>
    <lastmod>2020-03-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/missing-authorization-check-in-sap-netweaver-as-java-migrationservice-in-netweav/</loc>
    <lastmod>2020-03-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/in-smartermail/</loc>
    <lastmod>2020-02-27T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/daniel-schacknat/</loc>
    <lastmod>2020-02-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-fortisiem/</loc>
    <lastmod>2020-02-10T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2020-01-cve-2019-19470-rumble-in-pipe/</loc>
    <lastmod>2020-01-17T10:18:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authentication-bypass-path-traversal-in-ases/</loc>
    <lastmod>2020-01-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/path-traversal-in-telerik-mvc/</loc>
    <lastmod>2020-01-08T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/privilege-escalation-via-unsecure-net-deserialization-and-process-spoofing-in-ti/</loc>
    <lastmod>2019-11-27T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-300-people/</loc>
    <lastmod>2019-11-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-remote-code-execution-via-unsecure-net-deserialization-in-c1-cms/</loc>
    <lastmod>2019-10-18T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-sqlinjection-via-unprotected-java-servlet-in-manageengine-opmana/</loc>
    <lastmod>2019-10-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/mitigation-bypass-in-telerik-ui-for-ajax-asp-net/</loc>
    <lastmod>2019-10-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in-mylittleadmin/</loc>
    <lastmod>2019-08-27T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/path-traversal-unauthenticated-socks5-proxy-in-mailenable/</loc>
    <lastmod>2019-08-26T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2019-08-exploit-h2-database-native-libraries-jni/</loc>
    <lastmod>2019-08-01T14:54:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-cpanel-dovecot-solr/</loc>
    <lastmod>2019-07-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-remote-code-execution-via-unsecure-java-deserialization-in-ftapi/</loc>
    <lastmod>2019-07-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/daniel-schacknat/</loc>
    <lastmod>2019-07-19T14:03:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/evasion/</loc>
    <lastmod>2019-07-19T14:03:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2019-07-heap-based-amsi-bypass-in-vba/</loc>
    <lastmod>2019-07-19T14:03:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in/</loc>
    <lastmod>2019-06-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/ben-heimerdinger/</loc>
    <lastmod>2019-05-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-secure-global-desktop/</loc>
    <lastmod>2019-05-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/unauthenticated-remote-code-execution-via-unprotected-rmiregistry-in-ibm-servrai/</loc>
    <lastmod>2019-03-27T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/xxe-in-syncml-xxe-in-keyoti-rapidspell-in-smartermail/</loc>
    <lastmod>2019-02-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2019-02-telerik-revisited/</loc>
    <lastmod>2019-02-07T11:04:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in-cribmaster/</loc>
    <lastmod>2019-02-07T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in-telerik-ui-for-ajax-asp-net/</loc>
    <lastmod>2019-02-07T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in-devexpress/</loc>
    <lastmod>2019-01-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authenticated-file-system-data-exfiltration-via-soap-webservice-in-ilias/</loc>
    <lastmod>2018-12-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in-managed-workplace-rmm/</loc>
    <lastmod>2018-11-13T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/tags/lateral-movement/</loc>
    <lastmod>2018-07-06T14:08:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2018-07-lethalhta/</loc>
    <lastmod>2018-07-06T14:08:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/markus-pieton/</loc>
    <lastmod>2018-07-06T14:08:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/matthias-kaiser/</loc>
    <lastmod>2018-07-06T14:08:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2018-06-cve-2018-0624/</loc>
    <lastmod>2018-06-15T15:19:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2018-05-poor-richfaces/</loc>
    <lastmod>2018-05-30T15:00:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/el-injection-in-richfaces/</loc>
    <lastmod>2018-05-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/el-injection-in-richfaces/</loc>
    <lastmod>2018-05-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in-genuine-channels/</loc>
    <lastmod>2018-04-23T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-gwt/</loc>
    <lastmod>2018-04-13T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2018-03-exploiting-adobe-coldfusion/</loc>
    <lastmod>2018-03-13T15:41:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in/</loc>
    <lastmod>2018-02-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2018-01-handcrafted-gadgets/</loc>
    <lastmod>2018-01-18T16:07:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/el-injection-in/</loc>
    <lastmod>2017-08-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2017-05-sap-customers-make-sure-your-sapjvm-is/</loc>
    <lastmod>2017-05-17T16:56:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-p4/</loc>
    <lastmod>2017-05-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2017-04-amf/</loc>
    <lastmod>2017-04-04T16:01:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in/</loc>
    <lastmod>2017-04-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-jira/</loc>
    <lastmod>2017-04-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-spring-flex/</loc>
    <lastmod>2017-04-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-javabeans-setter-in-graniteds/</loc>
    <lastmod>2017-04-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-javabeans-setter-xxe-in-flamingo-amf-serializer/</loc>
    <lastmod>2017-04-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-javabeans-setter-xxe-in-flex-blazeds/</loc>
    <lastmod>2017-04-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-xxe-in-weborb-for-java/</loc>
    <lastmod>2017-04-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/arbitrary-file-upload-in-ezpublish/</loc>
    <lastmod>2016-11-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/sql-injection-in-ezpublish/</loc>
    <lastmod>2016-10-05T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-crashplan-proe/</loc>
    <lastmod>2016-09-16T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/in-service-manager/</loc>
    <lastmod>2016-05-25T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2016-05-return-of-rhino-old-gadget-revisited/</loc>
    <lastmod>2016-05-04T21:06:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2016-04-infiltrate16-slidedeck-java-deserialization/</loc>
    <lastmod>2016-04-12T16:11:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/sql-injection-path-traversal-jsp-file-inclusion-in-edge-server/</loc>
    <lastmod>2016-03-24T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-hyperion/</loc>
    <lastmod>2016-03-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/matthias-kaiser/</loc>
    <lastmod>2016-03-17T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2016-02-symantec-endpoint-protection-legacy-edition/</loc>
    <lastmod>2016-02-23T14:50:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/in-endpoint-protection/</loc>
    <lastmod>2016-02-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2016-02-java-and-command-line-injections-in-windows/</loc>
    <lastmod>2016-02-04T17:03:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/arbitrary-file-uploaddownload-in-edge-server/</loc>
    <lastmod>2016-01-05T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-xxe-in-service-manager/</loc>
    <lastmod>2015-12-18T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-weblogic-jms-client/</loc>
    <lastmod>2015-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-websphere-mq-jms-client/</loc>
    <lastmod>2015-12-08T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/command-injection-in-endpoint-protection-manager/</loc>
    <lastmod>2015-11-16T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-endpoint-protection-manager/</loc>
    <lastmod>2015-11-16T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-active-mq/</loc>
    <lastmod>2015-11-03T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/in-community/</loc>
    <lastmod>2015-10-02T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-command-injection-in-edge-server/</loc>
    <lastmod>2015-09-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2015-08-cve-2015-3269-apache-flex-blazeds-xxe/</loc>
    <lastmod>2015-08-24T13:23:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/in-flex-blazeds/</loc>
    <lastmod>2015-08-24T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-bamboo/</loc>
    <lastmod>2015-08-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2015-07-symantec-endpoint-protection/</loc>
    <lastmod>2015-07-31T08:23:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/authentication-bypass-arbitrary-file-writeread-privilege-escalation-path-travers/</loc>
    <lastmod>2015-07-31T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/sql-injection-in-webedition/</loc>
    <lastmod>2015-07-22T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/sql-injection-in-websitebaker/</loc>
    <lastmod>2015-07-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-weblogic-server/</loc>
    <lastmod>2015-06-15T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2015-06-reading-and-writing-files-with-mssql-openrowset/</loc>
    <lastmod>2015-06-09T15:19:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2015-05-cve-2015-2079-rce-usermin/</loc>
    <lastmod>2015-05-20T14:56:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/authors/david-elze/</loc>
    <lastmod>2015-05-20T14:56:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/command-execution-in-usermin/</loc>
    <lastmod>2015-05-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/credits/david-elze/</loc>
    <lastmod>2015-05-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2015-05-cve-2015-0935-bomgar-remote-support-portal/</loc>
    <lastmod>2015-05-08T20:48:00+02:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2015-03-sh-or-getting-shell-environment-from/</loc>
    <lastmod>2015-03-09T09:55:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2015-03-exploiting-hidden-saxon-xslt-parser-in/</loc>
    <lastmod>2015-03-02T14:54:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/blog/2015-02-how-i-could-ipass-your-client-security/</loc>
    <lastmod>2015-02-25T16:55:00+01:00</lastmod>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/privilege-escalation-via-named-pipe-in-ipass-open-mobile/</loc>
    <lastmod>2015-01-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://code-white.com/privacy-policy/privacy-policy/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/in-jira/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/binary-planting-in-management-server-client/</loc>
  </url><url>
    <loc>https://code-white.com/careers/</loc>
  </url><url>
    <loc>https://code-white.com/categories/</loc>
  </url><url>
    <loc>https://code-white.com/gbtjxr5jg3dxz9m9gbtjxr5jg3dxz9m9/</loc>
  </url><url>
    <loc>https://code-white.com/imprint/</loc>
  </url><url>
    <loc>https://code-white.com/imprint/imprint/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-activemq-artemis-jms-client/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-qpid-client-jms-client/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-spring-amqp/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-weblogic-server/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/java-deserialization-in-weblogic-server/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/named-pipe-process-call-arbitrary-in-management-server/</loc>
  </url><url>
    <loc>https://code-white.com/navids/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/net-deserialization-in-skype-for-business/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/path-traversal-in-management-server/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/path-traversalbinary-planting-on-deployed-agent-in-management-server/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/php-deserialization-in-remote-support-portal/</loc>
  </url><url>
    <loc>https://code-white.com/privacy-policy/</loc>
  </url><url>
    <loc>https://code-white.com/rss/</loc>
  </url><url>
    <loc>https://code-white.com/public-vulnerability-list/sql-injection-in-management-server/</loc>
  </url><url>
    <loc>https://code-white.com/start/</loc>
  </url>
</urlset>
