<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CVE-2024-21733 - Attack Surface Management Solutions | Sn1perSecurity LLC</title>
	<atom:link href="https://sn1persecurity.com/wordpress/tag/cve-2024-21733/feed/" rel="self" type="application/rss+xml" />
	<link>https://sn1persecurity.com/wordpress</link>
	<description>Get an attacker&#039;s view of your organization with our all-in-one offensive security platform</description>
	<lastBuildDate>Mon, 05 Feb 2024 16:32:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://sn1persecurity.com/wordpress/wp-content/uploads/2023/03/favoriteiconsniper.png</url>
	<title>CVE-2024-21733 - Attack Surface Management Solutions | Sn1perSecurity LLC</title>
	<link>https://sn1persecurity.com/wordpress</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">197797428</site>	<item>
		<title>CVE-2024-21733 Apache Tomcat HTTP Request Smuggling</title>
		<link>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cve-2024-21733-apache-tomcat-http-request-smuggling&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cve-2024-21733-apache-tomcat-http-request-smuggling</link>
					<comments>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Sun, 21 Jan 2024 19:32:46 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[0day]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[CVE-2024-21733]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[xer0dayz]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=26771</guid>

					<description><![CDATA[<p>Our security research team recently discovered a critical &#8220;0day&#8221; vulnerability which was assigned CVE-2024-21733. The vulnerability was discovered by xer0dayz from Sn1perSecurity LLC [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/">CVE-2024-21733 Apache Tomcat HTTP Request Smuggling</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26771</post-id>	</item>
	</channel>
</rss>
