<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://blog.mirch.io/pages/</loc>
    <lastmod>2025-10-02T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/</loc>
    <lastmod>2025-10-02T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/cve/</loc>
    <lastmod>2025-10-02T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/about/</loc>
    <lastmod>2025-07-05T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/sudo-elevation-of-privilege-vulnerabilities/</loc>
    <lastmod>2025-06-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/posts/</loc>
    <lastmod>2025-06-30T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2022/05/20/exploiting-kaseya-unitrends-backup-appliance-part-1/</loc>
    <lastmod>2022-05-20T14:50:25+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2021/01/25/sudoedit-lpe/</loc>
    <lastmod>2021-01-26T02:43:51+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2020/12/24/pihole-xss/</loc>
    <lastmod>2020-12-24T16:03:47+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2020/09/25/metasploit-module-developed-for-cve-2018-18556-vyos-privilege-escalation/</loc>
    <lastmod>2020-09-25T20:52:25+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2020/09/02/critical-vulnerabilities-discovered-in-mofi-routers/</loc>
    <lastmod>2020-09-02T18:08:08+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2020/03/17/cve-2020-3950-vmware-fusion-elevation-of-privilege/</loc>
    <lastmod>2020-03-18T03:55:16+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2019/12/18/signal-desktop-windows-lpe/</loc>
    <lastmod>2019-12-18T13:25:26+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/</loc>
    <lastmod>2019-11-15T12:54:14+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/posts/2019/08/25/cve-2018-1792-ibm-mq-privilege-escalation-fun-with-runpath/</loc>
    <lastmod>2019-08-25T16:37:18+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2019/06/10/cve-2019-12572-pia-windows-privilege-escalation-malicious-openssl-engine/</loc>
    <lastmod>2019-06-10T12:13:44+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2019/02/14/cve-2019-6724-barracuda-vpn-client-privilege-escalation-on-linux-and-macos/</loc>
    <lastmod>2019-02-14T15:31:43+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2019/01/09/linux-persistence-idea-using-group-passwords/</loc>
    <lastmod>2019-01-09T18:16:32+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2018/12/21/cve-2018-18629-keybase-linux-privilege-escalation/</loc>
    <lastmod>2018-12-21T18:43:08+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2018/12/09/cve-2018-19788-poc-polkit-improper-handling-of-user-with-uid-int_max-leading-to-authentication-bypass/</loc>
    <lastmod>2018-12-09T19:32:04+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/2018/11/05/cve-2018-18556-vyos-privilege-escalation-via-sudo-pppd-for-operator-users/</loc>
    <lastmod>2018-11-06T04:39:42+00:00</lastmod>
  </url><url>
    <loc>https://blog.mirch.io/all/</loc>
  </url><url>
    <loc>https://blog.mirch.io/categories/</loc>
  </url><url>
    <loc>https://blog.mirch.io/search/</loc>
  </url><url>
    <loc>https://blog.mirch.io/tags/</loc>
  </url>
</urlset>
