<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-silex-technology-sd-330ac-and-amc-manager</loc>
        <lastmod>2026-04-21T21:01:11+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-siemens-ruggedcom-crossbow-station-access-controller-sac</loc>
        <lastmod>2026-04-21T22:18:06+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-siemens-industrial-edge-management</loc>
        <lastmod>2026-04-21T22:18:17+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-siemens-sinec-nms-10</loc>
        <lastmod>2026-04-21T22:18:24+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-zero-motorcycles-firmware</loc>
        <lastmod>2026-04-21T22:18:29+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-siemens-sinec-nms-8</loc>
        <lastmod>2026-04-21T22:18:36+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-hardy-barth-salia-ev-charge-controller</loc>
        <lastmod>2026-04-21T22:18:43+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-siemens-scalance</loc>
        <lastmod>2026-04-21T22:18:51+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-siemens-analytics-toolkit</loc>
        <lastmod>2026-04-21T22:18:57+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-senselive-x3050</loc>
        <lastmod>2026-04-21T22:19:03+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-siemens-tpm-20</loc>
        <lastmod>2026-04-21T22:19:08+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-siemens-ruggedcom-crossbow-secure-access-manager-primary</loc>
        <lastmod>2026-04-21T22:19:15+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-zdi-26-294-0day-microsoft-windows-library-ms-ntlm-response-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T22:20:54+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-zdi-26-295-0day-publiccms-getxml-server-side-request-forgery-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T22:21:03+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-zdi-26-293-0day-microsoft-office-uri-handler-ntlm-response-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T22:20:29+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-21-zdi-26-245-0day-aws-mcp-server-aws-cli-command-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T22:22:55+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-20-cisa-adds-eight-known-exploited-vulnerabilities-to-catalog</loc>
        <lastmod>2026-04-21T21:01:11+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-20-supply-chain-compromise-impacts-axios-node-package-manager</loc>
        <lastmod>2026-04-21T22:21:10+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-16-delta-electronics-asda-soft</loc>
        <lastmod>2026-04-21T22:23:52+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-16-cisa-adds-one-known-exploited-vulnerability-to-catalog</loc>
        <lastmod>2026-04-21T21:01:11+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-16-aveva-pipeline-simulation</loc>
        <lastmod>2026-04-21T22:23:58+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-16-horner-automation-cscape-and-xl4-xl7-plc</loc>
        <lastmod>2026-04-21T22:23:47+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-16-anviz-multiple-products</loc>
        <lastmod>2026-04-21T22:47:21+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-271-avast-premium-security-gen-self-protection-driver-exposed-dangerous-function-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T23:03:02+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-272-aten-unizon-rpcprovider-missing-authentication-denial-of-service-vulnerability</loc>
        <lastmod>2026-04-21T23:03:30+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-273-microsoft-olive-deserialization-of-untrusted-data-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T23:25:21+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-274-microsoft-qlib-fit-deserialization-of-untrusted-data-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T23:31:48+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-275-microsoft-qlib-mountnfsuri-command-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T23:41:51+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-276-microsoft-windows-secure-kernel-double-free-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T23:14:13+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-277-microsoft-windows-afdsys-race-condition-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T23:46:43+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-278-microsoft-windows-win32kfull-improper-locking-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T23:18:36+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-279-microsoft-windows-snipping-tool-improper-input-validation-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T23:46:52+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-280-pwn2own-hp-deskjet-2855e-jobstatusevent-stack-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-22T00:34:34+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-270-trendai-apex-one-console-directory-traversal-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T22:54:20+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-268-samsung-magicinfo-9-server-incorrect-default-permissions-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T22:50:36+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-259-0day-docker-desktop-cli-plugins-incorrect-permission-assignment-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T22:26:51+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-260-0day-docker-desktop-system-editor-uncontrolled-search-path-element-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T22:26:59+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-261-0day-docker-desktop-credentialhelper-directory-traversal-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T22:27:03+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-262-adobe-coldfusion-deleteversion-directory-traversal-arbitrary-file-deletion-vulnerability</loc>
        <lastmod>2026-04-21T22:33:46+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-263-adobe-coldfusion-subscribetoendpoints-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T22:42:31+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-264-adobe-coldfusion-fetchcfsettingfile-directory-traversal-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T23:12:07+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-265-fortinet-fortiweb-cgibufalloc-integer-overflow-denial-of-service-vulnerability</loc>
        <lastmod>2026-04-21T23:20:25+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-266-fortinet-fortiweb-catcgipaths-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T23:16:29+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-267-malwarebytes-anti-malware-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T22:47:21+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-258-0day-docker-desktop-extension-manager-exposed-dangerous-function-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T22:33:23+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-281-microsoft-vcpkg-openssl-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T23:43:00+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-269-trendai-apex-one-console-directory-traversal-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T22:50:50+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-292-qnap-ts-453e-qvrpro-excpostgres-exposed-dangerous-method-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-291-ni-labview-lvclass-file-parsing-memory-corruption-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-22T00:34:47+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-290-ni-labview-lvlib-file-parsing-memory-corruption-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T23:56:36+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-289-linux-kernel-ets-scheduler-race-condition-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T23:56:15+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-288-drivelock-directory-traversal-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T23:52:58+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-287-drivelock-directory-traversal-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T23:52:45+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-282-gimp-hdr-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T23:48:46+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-283-gstreamer-qtdemux-stack-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T23:35:53+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-284-drivelock-directory-traversal-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T23:40:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-285-drivelock-directory-traversal-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T23:43:30+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-15-zdi-26-286-drivelock-sql-injection-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-22T00:08:41+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-14-cisa-adds-two-known-exploited-vulnerabilities-to-catalog</loc>
        <lastmod>2026-04-21T23:57:46+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-13-cisa-adds-seven-known-exploited-vulnerabilities-to-catalog</loc>
        <lastmod>2026-04-21T21:01:11+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-09-contemporary-controls-basc-20t</loc>
        <lastmod>2026-04-22T00:03:32+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-09-gpl-odorizers-gpl750</loc>
        <lastmod>2026-04-22T00:03:26+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-08-cisa-adds-one-known-exploited-vulnerability-to-catalog</loc>
        <lastmod>2026-04-21T21:01:11+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-07-iranian-affiliated-cyber-actors-exploit-programmable-logic-controllers-across-us-critical-infrastructure</loc>
        <lastmod>2026-04-22T00:06:20+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-07-mitsubishi-electric-genesis64-and-iconics-suite-products</loc>
        <lastmod>2026-04-22T00:47:52+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-06-cisa-adds-one-known-exploited-vulnerability-to-catalog</loc>
        <lastmod>2026-04-21T21:01:11+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-06-zdi-26-257-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-06-zdi-26-256-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-22T00:46:17+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-06-zdi-26-255-0day-labcenter-electronics-proteus-pdsprj-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-06-zdi-26-254-0day-labcenter-electronics-proteus-pdsprj-file-parsing-type-confusion-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-22T00:40:34+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-02-siemens-sicam-8-products</loc>
        <lastmod>2026-04-21T21:01:11+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-02-yokogawa-centum-vp</loc>
        <lastmod>2026-04-22T00:56:03+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-02-cisa-adds-one-known-exploited-vulnerability-to-catalog</loc>
        <lastmod>2026-04-21T21:01:11+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-02-zdi-26-251-foxit-pdf-reader-update-service-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-02-zdi-26-252-mozilla-firefox-ionmonkey-switch-statement-optimization-type-confusion-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-04-02-zdi-26-253-microsoft-visual-studio-code-mcpjson-command-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-31-zdi-26-250-linux-kernel-analog-device-driver-improper-validation-of-array-index-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-236-digilent-dasylab-dsb-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-235-digilent-dasylab-dsa-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-234-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-233-digilent-dasylab-dsa-file-parsing-out-of-bounds-read-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-232-pwn2own-red-hat-enterprise-linux-vmwgfx-driver-integer-overflow-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-231-apple-macos-exposure-of-sensitive-information-to-unauthorized-sphere-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-230-apple-macos-coremedia-framework-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-229-openclaw-client-pkce-verifier-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-228-openclaw-canvas-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-227-openclaw-canvas-path-traversal-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-237-pwn2own-qnap-qhora-322-ip6wanifset-improper-restriction-of-communication-channel-to-intended-endpoints-firewall-bypass-vulnerabi</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-238-linux-kernel-aoe-driver-use-after-free-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-249-nomachine-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-248-nomachine-external-control-of-file-path-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-247-nomachine-external-control-of-file-path-arbitrary-file-deletion-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-246-0day-aws-mcp-server-command-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-244-pwn2own-qnap-qhora-322-mirowebservercontrollersapiloginsingin-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-243-pwn2own-qnap-ts-453e-writefiletosvr-external-control-of-file-path-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-242-pwn2own-qnap-ts-453e-serverhandlerspyc-rr2skwargs-error-message-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-241-pwn2own-qnap-qhora-322-qvpndbmgr-username-sql-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-240-pwn2own-qnap-qhora-322-qvpndbmgr-roletype-improper-neutralization-of-escape-sequences-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-30-zdi-26-239-pwn2own-qnap-qhora-322-loginnewauthmiddlewareauthenticator-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-24-zdi-26-226-0day-microsoft-azure-mcp-azurecliservice-command-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-23-zdi-26-222-pwn2own-canon-imageclass-mf654cdw-bjnp-memory-corruption-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-23-zdi-26-223-pwn2own-samsung-galaxy-s25-smart-touch-call-application-protection-mechanism-failure-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-23-zdi-26-224-pwn2own-samsung-galaxy-s25-samsung-account-cross-site-scripting-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-23-zdi-26-225-pwn2own-samsung-galaxy-s25-samsung-account-open-redirect-security-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-19-zdi-26-217-gimp-psd-file-parsing-integer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-19-zdi-26-218-gimp-ani-file-parsing-integer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-19-zdi-26-219-gimp-jp2-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-19-zdi-26-220-gimp-psp-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-19-zdi-26-221-gimp-xpm-file-parsing-integer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-17-zdi-26-216-pwn2own-qnap-ts-453e-smbd-domainname-argument-injection-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-199-pwn2own-qnap-ts-453e-connlogtool-format-string-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-198-pwn2own-qnap-ts-453e-malwareremover-code-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-197-pwn2own-chargepoint-home-flex-revssh-service-command-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-196-pwn2own-chargepoint-home-flex-ocpp-getpreq-stack-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-195-pwn2own-chargepoint-home-flex-inclusion-of-sensitive-information-in-source-code-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-194-microsoft-exchange-interceptorsmtpagent-improper-input-validation-security-feature-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-193-pwn2own-linux-kernel-nftablesnewset-out-of-bounds-write-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-192-sonos-era-300-smb-response-out-of-bounds-access-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-191-pwn2own-linux-kernel-nftables-use-after-free-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-190-pwn2own-vmware-workstation-pvscsi-heap-based-buffer-overflow-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-189-pwn2own-vmware-esxi-vmxnet3-integer-overflow-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-188-pwn2own-vmware-esxi-vmci-integer-underflow-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T22:16:41+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-187-pwn2own-synology-diskstation-manager-netatalk-library-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-200-pwn2own-qnap-ts-453e-nvrlogeventadd-msg-sql-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-201-pwn2own-qnap-ts-453e-hyper-data-protector-plugin-hard-coded-credentials-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-202-pwn2own-qnap-ts-453e-hyper-data-protector-plugin-queryoriginalfilesize-sql-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-215-keepassxc-openssl-configuration-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-214-gimp-hdr-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-213-gimp-lbm-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-212-schneider-electric-ecostruxure-data-center-expert-hard-coded-password-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-211-delta-electronics-asda-soft-par-file-parsing-stack-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-210-pwn2own-samsung-galaxy-s25-samsung-members-security-feature-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-209-pwn2own-samsung-galaxy-s25-samsung-members-open-redirect-security-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-208-pwn2own-canon-imageclass-mf654cdw-ttf-parsing-integer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-207-pwn2own-canon-imageclass-mf654cdw-dtdcaddrimportsub-stack-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-206-pwn2own-canon-imageclass-mf654cdw-ttf-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-205-pwn2own-canon-imageclass-mf654cdw-pjcc-request-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-204-pwn2own-canon-imageclass-mf654cdw-xps-parser-stack-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-16-zdi-26-203-pwn2own-canon-imageclass-mf654cdw-xml-soap-request-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-178-microsoft-windows-cdd-improper-locking-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-177-array-networks-motionpro-arrayinstallmanager-incorrect-permission-assignment-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-176-apple-macos-libusdms-alembic-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-175-apple-macos-imageio-sgi-file-parsing-out-of-bounds-read-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-174-apple-macos-imageio-sgi-file-parsing-integer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-173-apple-macos-audio-apac-frame-decoding-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-179-microsoft-windows-win32kfull-improper-locking-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-180-microsoft-windows-cdd-improper-locking-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-181-microsoft-windows-win32full-improper-release-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-182-microsoft-windows-win32full-improper-release-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-183-microsoft-windows-win32full-improper-release-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-184-microsoft-windows-ndis-driver-use-after-free-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-185-microsoft-windows-gdi-bitmap-parsing-out-of-bound-read-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-10-zdi-26-186-fortinet-forticlient-link-following-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-09-zdi-26-171-unraid-update-request-path-traversal-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-09-zdi-26-172-unraid-authentication-request-path-traversal-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-159-pwn2own-philips-hue-bridge-hkhap-characteristics-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-158-pwn2own-philips-hue-bridge-homekit-hkhappairstorageput-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-157-pwn2own-philips-hue-bridge-homekit-accessory-protocol-static-nonce-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-156-pwn2own-philips-hue-bridge-homekit-accessory-protocol-transient-pairing-mode-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-155-pwn2own-philips-hue-bridge-happairverifyhandler-sub-tlv-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-154-pwn2own-philips-hue-bridge-homekit-pair-setup-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-153-pwn2own-philips-hue-bridge-zigbee-stack-custom-command-handler-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-152-docker-desktop-docker-plugins-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-151-delta-electronics-cncsoft-g2-dpax-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-160-pwn2own-philips-hue-bridge-hkhap-ed25519-signature-verification-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-161-gstreamer-dvb-subtitles-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-170-gstreamer-h266-codec-parser-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-169-gstreamer-h266-codec-parser-integer-underflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-168-gstreamer-riff-palette-integer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-167-gstreamer-rtpqdm2depay-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-166-gstreamer-rtpqdm2depay-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-165-gstreamer-realmedia-demuxer-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-164-gstreamer-asf-demuxer-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-163-gstreamer-jpeg-parser-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-06-zdi-26-162-gstreamer-h266-codec-parser-stack-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-140-trend-micro-apex-one-origin-validation-error-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-139-trend-micro-apex-one-security-agent-icore-service-origin-validation-error-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-138-trend-micro-apex-one-virus-scan-engine-link-following-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-137-trend-micro-apex-one-console-directory-traversal-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-136-trend-micro-apex-one-console-directory-traversal-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-135-langchain-langgraph-basecache-deserialization-of-untrusted-data-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-134-hewlett-packard-enterprise-autopass-license-server-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-133-pwn2own-music-assistant-updatelibraryitem-external-control-of-file-path-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-141-trend-micro-apex-one-security-agent-icore-service-signature-verification-time-of-check-time-of-use-local-privilege-escalation-vu</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-142-trend-micro-apex-one-security-agent-cache-mechanism-time-of-check-time-of-use-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-150-docker-desktop-for-mac-docker-model-runner-exposed-dangerous-function-denial-of-service-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-149-trend-micro-cleaner-one-pro-link-following-denial-of-service-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-148-trend-micro-apex-central-improper-authentication-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-147-trend-micro-apex-central-improper-authentication-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-146-trend-micro-apex-central-manual-update-server-side-request-forgery-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-145-trend-micro-apex-central-scheduled-update-server-side-request-forgery-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-144-trend-micro-apex-central-hub-server-server-side-request-forgery-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-03-03-zdi-26-143-trend-micro-apex-one-security-agent-tmselfprotect-origin-validation-error-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-124-claude-hovercraft-executeclaudecode-command-injection-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-125-docker-desktop-grpcfuse-kernel-module-out-of-bounds-read-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-126-pwn2own-ubiquiti-networks-ai-pro-discovery-protocol-missing-encryption-protocol-downgrade-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-127-pwn2own-ubiquiti-networks-ai-pro-cleartext-transmission-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-128-pwn2own-ubiquiti-networks-ai-pro-uncaught-exception-denial-of-service-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-129-socomec-diris-a-40-http-api-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-130-icewarp-collaboration-directory-traversal-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-131-siemens-sinec-nms-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-25-zdi-26-132-siemens-sinec-nms-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-23-zdi-26-123-docker-desktop-mcp-server-cleartext-storage-of-sensitive-information-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-113-dassault-systmes-edrawings-viewer-eprt-file-parsing-memory-corruption-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-112-dassault-systmes-edrawings-viewer-eprt-file-parsing-uninitialized-variable-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-111-mlflow-use-of-default-password-authentication-bypass-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-110-bosch-rexroth-indraworks-print-settings-file-parsing-deserialization-of-untrusted-data-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-109-bosch-rexroth-indraworks-opctestclient-xml-file-parsing-deserialization-of-untrusted-data-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-108-bosch-rexroth-indraworks-uatestclient-xml-file-parsing-deserialization-of-untrusted-data-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-114-dassault-systmes-edrawings-viewer-eprt-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-115-fortinet-forticlient-vpn-fcconfig-utility-link-following-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-116-tensorflow-hdf5-library-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-122-pdf-xchange-editor-trackerupdate-uncontrolled-search-path-element-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-121-gimp-xwd-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-120-gimp-icns-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-119-gimp-xwd-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-118-gimp-pgm-file-parsing-uninitialized-memory-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-19-zdi-26-117-rustdesk-client-for-windows-transfer-file-link-following-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-18-zdi-26-107-autodesk-autocad-model-file-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-18-zdi-26-106-autodesk-autocad-catpart-file-parsing-out-of-bounds-write-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-097-oracle-virtualbox-vmsvga-heap-based-buffer-overflow-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-098-oracle-virtualbox-vmsvga-use-after-free-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-099-oracle-virtualbox-vmsvga-race-condition-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-100-oracle-virtualbox-lsilogic-uninitialized-memory-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-101-oracle-virtualbox-buslogic-uninitialized-memory-information-disclosure-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-102-oracle-virtualbox-vmsvga-out-of-bounds-write-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-103-oracle-virtualbox-vmsvga-out-of-bounds-access-local-privilege-escalation-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-104-sante-dicom-viewer-pro-dcm-file-parsing-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-105-mlflow-tracking-server-artifact-handler-directory-traversal-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
        <url>
        <loc>https://knutmichael.com/radar/2026-02-13-zdi-26-096-dassault-systmes-edrawings-viewer-eprt-file-parsing-heap-based-buffer-overflow-remote-code-execution-vulnerability</loc>
        <lastmod>2026-04-21T21:01:14+00:00</lastmod>
    </url>
    </urlset>
