<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Vulnerabilities | Anthony Peruma</title><link>https://www.peruma.me/tag/vulnerabilities/</link><atom:link href="https://www.peruma.me/tag/vulnerabilities/index.xml" rel="self" type="application/rss+xml"/><description>Vulnerabilities</description><generator>Wowchemy (https://wowchemy.com)</generator><language>en-us</language><lastBuildDate>Sat, 01 Apr 2017 00:00:00 +0000</lastBuildDate><image><url>https://www.peruma.me/media/icon_hu6ff2303f8c70218a48ee81c54ca12e93_198050_512x512_fill_lanczos_center_3.png</url><title>Vulnerabilities</title><link>https://www.peruma.me/tag/vulnerabilities/</link></image><item><title>Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird</title><link>https://www.peruma.me/publication/2017-icsa-vulnerabilities/</link><pubDate>Sat, 01 Apr 2017 00:00:00 +0000</pubDate><guid>https://www.peruma.me/publication/2017-icsa-vulnerabilities/</guid><description/></item></channel></rss>