This is a vulnerability detection and exploitation tool design to take in a list of targets and check for the arbitrary file read vulnerability in Check Point Security Gateways.
d575146be656412f5d17d26c369d9200409d3065c0231f09c6d7c748bf983278
© 2022 Packet Storm. All rights reserved.