Update CVE-2024-2330.yaml (TEST)

This commit is contained in:
Ritik Chaddha
2025-06-11 14:33:41 +05:30
committed by GitHub
parent f184a03276
commit 39e8e513aa

View File

@@ -7,11 +7,10 @@ info:
description: |
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-2330
- https://nvd.nist.gov/vuln/detail/CVE-2024-2330
- https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md
- https://vuldb.com/?ctiid.256281
- https://vuldb.com/?id.256281
- https://nvd.nist.gov/vuln/detail/CVE-2024-2330
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss-score: 6.3
@@ -47,4 +46,4 @@ http:
group: 1
regex:
- "XPATH syntax error: '([~0-9.]+)'"
# digest: 490a00463044022076c8b969b886d0839ed40b07e6fb126051ad976b3b900e6d8209366962ff65c2022050c75dcdb72c452455f350600955c2b4f7ff794151e44f84ae17b144e787f3e0:922c64590222798bb761d5b6d8e72950
# digest: 490a00463044022076c8b969b886d0839ed40b07e6fb126051ad976b3b900e6d8209366962ff65c2022050c75dcdb72c452455f350600955c2b4f7ff794151e44f84ae17b144e787f3e0:922c64590222798bb761d5b6d8e72950