mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 07:43:27 +08:00
Update CVE-2024-2330.yaml (TEST)
This commit is contained in:
@@ -7,11 +7,10 @@ info:
|
||||
description: |
|
||||
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
||||
reference:
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-2330
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2024-2330
|
||||
- https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md
|
||||
- https://vuldb.com/?ctiid.256281
|
||||
- https://vuldb.com/?id.256281
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2024-2330
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
||||
cvss-score: 6.3
|
||||
@@ -47,4 +46,4 @@ http:
|
||||
group: 1
|
||||
regex:
|
||||
- "XPATH syntax error: '([~0-9.]+)'"
|
||||
# digest: 490a00463044022076c8b969b886d0839ed40b07e6fb126051ad976b3b900e6d8209366962ff65c2022050c75dcdb72c452455f350600955c2b4f7ff794151e44f84ae17b144e787f3e0:922c64590222798bb761d5b6d8e72950
|
||||
# digest: 490a00463044022076c8b969b886d0839ed40b07e6fb126051ad976b3b900e6d8209366962ff65c2022050c75dcdb72c452455f350600955c2b4f7ff794151e44f84ae17b144e787f3e0:922c64590222798bb761d5b6d8e72950
|
||||
|
||||
Reference in New Issue
Block a user