<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerability - Attack Surface Management Solutions | Sn1perSecurity LLC</title>
	<atom:link href="https://sn1persecurity.com/wordpress/tag/vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://sn1persecurity.com/wordpress</link>
	<description>Get an attacker&#039;s view of your organization with our all-in-one offensive security platform</description>
	<lastBuildDate>Mon, 05 Feb 2024 16:32:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://sn1persecurity.com/wordpress/wp-content/uploads/2023/03/favoriteiconsniper.png</url>
	<title>vulnerability - Attack Surface Management Solutions | Sn1perSecurity LLC</title>
	<link>https://sn1persecurity.com/wordpress</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">197797428</site>	<item>
		<title>CVE-2024-21733 Apache Tomcat HTTP Request Smuggling</title>
		<link>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cve-2024-21733-apache-tomcat-http-request-smuggling&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cve-2024-21733-apache-tomcat-http-request-smuggling</link>
					<comments>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Sun, 21 Jan 2024 19:32:46 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[0day]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[CVE-2024-21733]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[xer0dayz]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=26771</guid>

					<description><![CDATA[<p>Our security research team recently discovered a critical &#8220;0day&#8221; vulnerability which was assigned CVE-2024-21733. The vulnerability was discovered by xer0dayz from Sn1perSecurity LLC [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/">CVE-2024-21733 Apache Tomcat HTTP Request Smuggling</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/cve-2024-21733-apache-tomcat-http-request-smuggling/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26771</post-id>	</item>
		<item>
		<title>Confluence RCE via OGNL template injection (CVE-2022-26134)</title>
		<link>https://sn1persecurity.com/wordpress/confluence-rce-ognl-template-injection-cve-2022-26134/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=confluence-rce-ognl-template-injection-cve-2022-26134&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=confluence-rce-ognl-template-injection-cve-2022-26134</link>
					<comments>https://sn1persecurity.com/wordpress/confluence-rce-ognl-template-injection-cve-2022-26134/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Sun, 05 Jun 2022 17:25:37 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[confluence]]></category>
		<category><![CDATA[CVE-2022-26134]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=18544</guid>

					<description><![CDATA[<p>A critical vulnerability affecting the Atlassian Confluence was disclosed and designated CVE-2022-26134 which allows an un-authenticated attacker to execute arbitrary code on vulnerable [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/confluence-rce-ognl-template-injection-cve-2022-26134/">Confluence RCE via OGNL template injection (CVE-2022-26134)</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/confluence-rce-ognl-template-injection-cve-2022-26134/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18544</post-id>	</item>
		<item>
		<title>BIG-IP iControl REST RCE (CVE-2022-1388) Detection with Sn1per Professional</title>
		<link>https://sn1persecurity.com/wordpress/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional</link>
					<comments>https://sn1persecurity.com/wordpress/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Tue, 10 May 2022 13:24:08 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[CVE-2022-1388]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=18193</guid>

					<description><![CDATA[<p>A critical vulnerability affecting the F5 BIG-IP devices was disclosed and designated CVE-2022-1388 which allows an un-authenticated attacker to execute arbitrary code on [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional/">BIG-IP iControl REST RCE (CVE-2022-1388) Detection with Sn1per Professional</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18193</post-id>	</item>
		<item>
		<title>VMware Workspace ONE Access freemarker SSTI (CVE-2022-22954) Detection with Sn1per Professional</title>
		<link>https://sn1persecurity.com/wordpress/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional</link>
					<comments>https://sn1persecurity.com/wordpress/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Thu, 14 Apr 2022 22:52:21 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[CVE's]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[CVE-2022-22954]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=17988</guid>

					<description><![CDATA[<p>Information regarding a critical 0-day vulnerability affecting the VMware Workspace ONE Access and Identity Manager was disclosed and designated CVE-2022-22954 which allows an [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional/">VMware Workspace ONE Access freemarker SSTI (CVE-2022-22954) Detection with Sn1per Professional</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17988</post-id>	</item>
		<item>
		<title>Sn1per Professional Nessus Add-on Update!</title>
		<link>https://sn1persecurity.com/wordpress/sn1per-professional-nessus-add-on-update/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sn1per-professional-nessus-add-on-update&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sn1per-professional-nessus-add-on-update</link>
					<comments>https://sn1persecurity.com/wordpress/sn1per-professional-nessus-add-on-update/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Mon, 22 Nov 2021 01:34:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[2021]]></category>
		<category><![CDATA[add-on]]></category>
		<category><![CDATA[addon]]></category>
		<category><![CDATA[api]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[integration]]></category>
		<category><![CDATA[nessus]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[scan]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[sn1persecurity]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[v10.x]]></category>
		<category><![CDATA[v2.0]]></category>
		<category><![CDATA[v9.0]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[xer0dayz]]></category>
		<guid isPermaLink="false">https://sn1persecurity.com/wordpress/?p=16906</guid>

					<description><![CDATA[<p>In case you missed it, we recently added support for Nessus v10.x in Sn1per Professional (version 1.0 of our Nessus Add-on only supported [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/sn1per-professional-nessus-add-on-update/">Sn1per Professional Nessus Add-on Update!</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/sn1per-professional-nessus-add-on-update/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16906</post-id>	</item>
		<item>
		<title>Sn1per Professional MassPwn Add-on Released!</title>
		<link>https://sn1persecurity.com/wordpress/sn1per-professional-masspwn-add-on-released/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sn1per-professional-masspwn-add-on-released&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sn1per-professional-masspwn-add-on-released</link>
					<comments>https://sn1persecurity.com/wordpress/sn1per-professional-masspwn-add-on-released/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Tue, 13 Jul 2021 16:24:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[2021]]></category>
		<category><![CDATA[add-on]]></category>
		<category><![CDATA[addon]]></category>
		<category><![CDATA[api]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[integration]]></category>
		<category><![CDATA[Metasploit]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[scan]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[sn1persecurity]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[v9.0]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[xer0dayz]]></category>
		<guid isPermaLink="false">https://xerosecurity.com/wordpress/?p=16007</guid>

					<description><![CDATA[<p>Leverage the full power of Metasploit with the new &#8220;MassPwn Add-on&#8221; for Sn1per Professional v9.0. Easily customize each Metasploit scan to meet your [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/sn1per-professional-masspwn-add-on-released/">Sn1per Professional MassPwn Add-on Released!</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/sn1per-professional-masspwn-add-on-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16007</post-id>	</item>
		<item>
		<title>Attack Surface Management With Sn1per Professional</title>
		<link>https://sn1persecurity.com/wordpress/continuous-attack-surface-management-with-sn1per-professional/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=continuous-attack-surface-management-with-sn1per-professional&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=continuous-attack-surface-management-with-sn1per-professional</link>
					<comments>https://sn1persecurity.com/wordpress/continuous-attack-surface-management-with-sn1per-professional/#respond</comments>
		
		<dc:creator><![CDATA[xer0dayz]]></dc:creator>
		<pubDate>Mon, 08 Feb 2021 17:20:26 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Bug Bounties]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[0day]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[bugbounty]]></category>
		<category><![CDATA[CAST]]></category>
		<category><![CDATA[continuous]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[demo]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[modern]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[pentesting]]></category>
		<category><![CDATA[professional]]></category>
		<category><![CDATA[recon]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[reduction]]></category>
		<category><![CDATA[sn1per]]></category>
		<category><![CDATA[sn1persecurity]]></category>
		<category><![CDATA[surface]]></category>
		<category><![CDATA[team]]></category>
		<category><![CDATA[test]]></category>
		<category><![CDATA[testing]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[xer0dayz]]></category>
		<guid isPermaLink="false">https://xerosecurity.com/wordpress/?p=14967</guid>

					<description><![CDATA[<p>External Attack Surface Management (EASM) has become a crucial function for every organization to gain visibility of their perimeter security. Having the right [&#8230;]</p>
<p>The post <a href="https://sn1persecurity.com/wordpress/continuous-attack-surface-management-with-sn1per-professional/">Attack Surface Management With Sn1per Professional</a> first appeared on <a href="https://sn1persecurity.com/wordpress">Attack Surface Management Solutions | Sn1perSecurity LLC</a>.</p>]]></description>
		
					<wfw:commentRss>https://sn1persecurity.com/wordpress/continuous-attack-surface-management-with-sn1per-professional/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14967</post-id>	</item>
	</channel>
</rss>
