<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>scanner - Attack Surface Management Solutions | Sn1perSecurity LLC</title>
	<atom:link href="https://sn1persecurity.com/wordpress/tag/scanner/feed/" rel="self" type="application/rss+xml" />
	<link>https://sn1persecurity.com/wordpress</link>
	<description>Get an attacker&#039;s view of your organization with our all-in-one offensive security platform</description>
	<lastBuildDate>Mon, 05 Feb 2024 16:32:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://sn1persecurity.com/wordpress/wp-content/uploads/2023/03/favoriteiconsniper.png</url>
	<title>scanner - Attack Surface Management Solutions | Sn1perSecurity LLC</title>
	<link>https://sn1persecurity.com/wordpress</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">197797428</site>	<item>
		<title>CVE-2024-21733 Apache Tomcat HTTP Request Smuggling</title>
		<link>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cve-2024-21733-apache-tomcat-http-request-smuggling&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cve-2024-21733-apache-tomcat-http-request-smuggling</link>
					<comments>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Sun, 21 Jan 2024 19:32:46 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[0day]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[CVE-2024-21733]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[xer0dayz]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=26771</guid>

					<description><![CDATA[<p>Our security research team recently discovered a critical &#8220;0day&#8221; vulnerability which was assigned CVE-2024-21733. The vulnerability was discovered by xer0dayz from Sn1perSecurity LLC [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/">CVE-2024-21733 Apache Tomcat HTTP Request Smuggling</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26771</post-id>	</item>
		<item>
		<title>Confluence RCE via OGNL template injection (CVE-2022-26134)</title>
		<link>https://sn1persecurity.com/wordpress/confluence-rce-ognl-template-injection-cve-2022-26134/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=confluence-rce-ognl-template-injection-cve-2022-26134&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=confluence-rce-ognl-template-injection-cve-2022-26134</link>
					<comments>https://sn1persecurity.com/wordpress/confluence-rce-ognl-template-injection-cve-2022-26134/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Sun, 05 Jun 2022 17:25:37 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[confluence]]></category>
		<category><![CDATA[CVE-2022-26134]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=18544</guid>

					<description><![CDATA[<p>A critical vulnerability affecting the Atlassian Confluence was disclosed and designated CVE-2022-26134 which allows an un-authenticated attacker to execute arbitrary code on vulnerable [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/confluence-rce-ognl-template-injection-cve-2022-26134/">Confluence RCE via OGNL template injection (CVE-2022-26134)</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/confluence-rce-ognl-template-injection-cve-2022-26134/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18544</post-id>	</item>
		<item>
		<title>BIG-IP iControl REST RCE (CVE-2022-1388) Detection with Sn1per Professional</title>
		<link>https://sn1persecurity.com/wordpress/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional</link>
					<comments>https://sn1persecurity.com/wordpress/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Tue, 10 May 2022 13:24:08 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[CVE-2022-1388]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=18193</guid>

					<description><![CDATA[<p>A critical vulnerability affecting the F5 BIG-IP devices was disclosed and designated CVE-2022-1388 which allows an un-authenticated attacker to execute arbitrary code on [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional/">BIG-IP iControl REST RCE (CVE-2022-1388) Detection with Sn1per Professional</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18193</post-id>	</item>
		<item>
		<title>VMware Workspace ONE Access freemarker SSTI (CVE-2022-22954) Detection with Sn1per Professional</title>
		<link>https://sn1persecurity.com/wordpress/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional</link>
					<comments>https://sn1persecurity.com/wordpress/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Thu, 14 Apr 2022 22:52:21 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[CVE-2022-22954]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=17988</guid>

					<description><![CDATA[<p>Information regarding a critical 0-day vulnerability affecting the VMware Workspace ONE Access and Identity Manager was disclosed and designated CVE-2022-22954 which allows an [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional/">VMware Workspace ONE Access freemarker SSTI (CVE-2022-22954) Detection with Sn1per Professional</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17988</post-id>	</item>
	</channel>
</rss>
