<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://blog.amberwolf.com/blog/2026/march/patch-bypass---netskope-client-for-windows---local-privilege-escalation-via-rogue-server/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.amberwolf.com/tags/bypass/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/netskope/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/netskope/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/vulnerability/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/vulnerability-disclosure/</loc><lastmod>2026-03-24T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/delinea/</loc><lastmod>2026-02-27T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/delinea/</loc><lastmod>2026-02-27T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2026/february/delinea-protocol-handler---return-of-the-msi/</loc><lastmod>2026-02-27T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/disclosure/</loc><lastmod>2026-02-27T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/author/adam-boylan/</loc><lastmod>2026-01-30T12:28:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2026/january/advisory---check-point-harmony-local-privilege-escalation-cve-2025-9142/</loc><lastmod>2026-01-21T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/september/kubernetes_namespace_boundaries/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/kubernetes/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/august/advisory---netskope-client-for-windows---local-privilege-escalation-via-rogue-server/</loc><lastmod>2025-08-29T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/defcon/</loc><lastmod>2025-08-29T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/research/</loc><lastmod>2025-08-29T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/ztna/</loc><lastmod>2025-08-29T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/ztna/</loc><lastmod>2025-08-29T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/august/delinea-protocol-handler---msi-strikes-back/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/pam/</loc><lastmod>2025-08-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/august/advisory---netskope-cross-tenant-authentication-bypass/</loc><lastmod>2025-08-15T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/august/advisory---zscaler-saml-authentication-bypass/</loc><lastmod>2025-08-09T22:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/august/breaking-into-your-network-zer0-effort/</loc><lastmod>2025-08-15T10:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/nachovpn/</loc><lastmod>2025-08-15T10:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/tool/</loc><lastmod>2025-08-15T10:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/vpn/</loc><lastmod>2025-08-15T10:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/zscaler/</loc><lastmod>2025-08-09T22:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/zscaler/</loc><lastmod>2025-08-09T22:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/author/gavin-holt/</loc><lastmod>2025-08-09T22:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/globalprotect/</loc><lastmod>2025-08-04T19:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/categories/nachovpn/</loc><lastmod>2025-08-04T19:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/august/nachovpn-update---palo-alto-globalprotect/</loc><lastmod>2025-08-04T19:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/palo-alto/</loc><lastmod>2025-08-04T19:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/ivanti/</loc><lastmod>2025-07-29T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/july/nachovpn-update---ivanti-connect-secure/</loc><lastmod>2025-07-29T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/dell/</loc><lastmod>2025-06-04T09:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/thinos/</loc><lastmod>2025-06-04T09:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/june/thinos---unencrypted-memory-dumps-cve-2025-32752/</loc><lastmod>2025-06-04T09:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/author/darren-mcdonald/</loc><lastmod>2025-06-03T01:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2025/january/reproducing-cve-2024-9042---command-injection-in-windows-kubernetes-nodes/</loc><lastmod>2025-01-17T09:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/author/iain-smart/</loc><lastmod>2025-01-16T18:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/</loc><lastmod>2024-12-26T01:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/november/introducing-nachovpn---one-vpn-server-to-pwn-them-all/</loc><lastmod>2024-11-26T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/november/palo-alto-globalprotect---code-execution-and-privilege-escalation-via-malicious-vpn-server-cve-2024-5921/</loc><lastmod>2024-11-26T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/november/sonicwall-netextender-for-windows---rce-as-system-via-epc-client-update-cve-2024-29014/</loc><lastmod>2024-11-26T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/vpn/</loc><lastmod>2024-11-26T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/vulnerability-disclosure/</loc><lastmod>2024-11-26T09:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/october/cve-2024-37404-ivanti-connect-secure-authenticated-rce-via-openssl-crlf-injection/</loc><lastmod>2024-10-08T14:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/september/skeleton-cookie-breaking-into-safeguard-with-cve-2024-45488/</loc><lastmod>2024-09-17T05:30:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/september/cve-2024-45488-one-identity-safeguard-for-privileged-passwords-authentication-bypass/</loc><lastmod>2024-09-04T13:00:00+00:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/july/amberwolf-uncovers-critical-vulnerabilities-in-cato-client/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/author/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/tags/cato/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/july/cve-2024-6977-cato-client-account-takeover-via-sensitive-log-data/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/july/cve-2024-6975-cato-client-local-privilege-escalation-via-openssl-configuration-file/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/july/cve-2024-6974-cato-client-local-privilege-escalation-via-self-upgrade/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/july/cato-sso-open-redirect-leading-to-config-theft/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/author/david-cash/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/july/cve-2024-6973-cato-client-remote-code-execution-via-crafted-urls/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/author/richard-warren/</loc><lastmod>2024-07-31T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/blog/2024/july/cve-2024-6978-cato-client-local-root-certificate-install-as-low-privileged-user/</loc><lastmod>2024-07-30T18:00:00+01:00</lastmod></url><url><loc>https://blog.amberwolf.com/homepage/</loc></url><url><loc>https://blog.amberwolf.com/404/</loc></url><url><loc>https://blog.amberwolf.com/disclosure-policy/</loc></url></urlset>