mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
Update CVE-2024-2330.yaml (TEST)
This commit is contained in:
@@ -7,11 +7,10 @@ info:
|
|||||||
description: |
|
description: |
|
||||||
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
||||||
reference:
|
reference:
|
||||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-2330
|
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2024-2330
|
|
||||||
- https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md
|
- https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md
|
||||||
- https://vuldb.com/?ctiid.256281
|
- https://vuldb.com/?ctiid.256281
|
||||||
- https://vuldb.com/?id.256281
|
- https://vuldb.com/?id.256281
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-2330
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
||||||
cvss-score: 6.3
|
cvss-score: 6.3
|
||||||
@@ -47,4 +46,4 @@ http:
|
|||||||
group: 1
|
group: 1
|
||||||
regex:
|
regex:
|
||||||
- "XPATH syntax error: '([~0-9.]+)'"
|
- "XPATH syntax error: '([~0-9.]+)'"
|
||||||
# digest: 490a00463044022076c8b969b886d0839ed40b07e6fb126051ad976b3b900e6d8209366962ff65c2022050c75dcdb72c452455f350600955c2b4f7ff794151e44f84ae17b144e787f3e0:922c64590222798bb761d5b6d8e72950
|
# digest: 490a00463044022076c8b969b886d0839ed40b07e6fb126051ad976b3b900e6d8209366962ff65c2022050c75dcdb72c452455f350600955c2b4f7ff794151e44f84ae17b144e787f3e0:922c64590222798bb761d5b6d8e72950
|
||||||
|
|||||||
Reference in New Issue
Block a user