<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//siewruk.me/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://siewruk.me/2024/03/11/geneza-podatnosci-cve-2017-5638-apache-struts-2-rce/</loc>
		<lastmod>2024-03-14T20:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/DALL%C2%B7E-2024-02-27-11.20.08-Create-an-image-that-symbolizes-cyber-security-and-the-vulnerability-of-systems-to-code-injection-attacks.-The-image-should-depict-a-digital-landscape.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/Pasted-image-20240227103058.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/Pasted-image-20240227104552.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/Pasted-image-20240227104952.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/Pasted-image-20240227110924.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/03/11/geneza-podatnosci-cve-2021-44228-a-k-a-log4shell/</loc>
		<lastmod>2024-03-14T20:23:49+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/DALL%C2%B7E-2024-02-20-23.29.26-Create-an-eye-catching-and-informative-image-that-illustrates-the-theme-of-a-blog-series-about-software-vulnerabilities.-The-image-should-depict-a-mag.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/Pasted-image-20240220221107.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/Zrzut-ekranu-2024-02-20-o-22.44.16.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/Zrzut-ekranu-2024-02-20-o-22.24.19.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/03/19/geneza-podatnosci-cve-2022-1471-snakeyaml/</loc>
		<lastmod>2024-03-19T21:59:19+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/DALL%C2%B7E-2024-03-18-15.08.59-Create-a-horizontal-logo-featuring-a-snake-and-a-computer-next-to-each-other.-The-snake-should-be-on-the-left-looking-at-the-computer-screen-from-the.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/03/27/bezpieczenstwo-api-w-2024-analiza-raportu/</loc>
		<lastmod>2024-03-27T10:36:56+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/DALL%C2%B7E-2024-03-27-11.36.24-A-modern-digital-style-wide-banner-for-a-blog-post-about-API-security.-The-banner-features-a-large-golden-lock-in-the-center-symbolizing-security.-S.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/03/image-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/04/02/geneza-podatnosci-cve-2024-1597-postgresql-jdbc-driver/</loc>
		<lastmod>2024-04-02T10:27:36+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/DALL%C2%B7E-2024-04-02-11.37.47-Create-a-wide-banner-image-suitable-for-a-blog-post-about-the-vulnerability-in-PostgreSQL.-The-banner-should-feature-a-stylized-representation-of-the-.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/04/15/geneza-podatnosci-xss-cve-w-liferay/</loc>
		<lastmod>2024-04-22T11:25:57+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/baner_xss.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/04/29/malicious-packages-jak-falszywe-repozytoria-zagrazaja-bezpieczenstwu-twojej-aplikacji/</loc>
		<lastmod>2024-04-29T12:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/malicious_package.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/04/image-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/06/17/gitops-zalety-i-zagrozenia-cybersec/</loc>
		<lastmod>2024-06-17T08:47:40+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/06/baner_gitops.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/06/Zrzut-ekranu-2024-06-17-o-10.19.58.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/06/Zrzut-ekranu-2024-06-17-o-10.34.39.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/08/06/api-discovery-vs-api-gateway-czy-api-discovery-wnosi-rzeczywista-wartosc/</loc>
		<lastmod>2024-08-06T12:47:19+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/08/lead-api.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/08/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/08/26/jak-mixewayflow-upraszcza-testy-bezpieczenstwa-w-ci-cd-przewodnik-krok-po-kroku/</loc>
		<lastmod>2024-08-26T11:23:22+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/08/Remove-background-project-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/08/flow_scans.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/08/flow_process.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2024/09/16/nowa-podatnosc-w-spring-framework-umozliwiajaca-atak-typu-path-traversal-cve-2024-38816/</loc>
		<lastmod>2024-09-16T10:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2024/09/cve.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://siewruk.me/2025/03/18/czy-na-pewno-testujesz-swoj-proces-ci-cd-lekcja-z-github-actions/</loc>
		<lastmod>2025-03-18T09:57:51+00:00</lastmod>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2025/03/Gemini-Generated-Image.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2025/03/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://siewruk.me/wp-content/uploads/2025/03/image-1.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->