Page 2 of 36 results (0.006 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

01 Apr 2024 — netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/export_excel_user.php. netentsec NS-ASG 6.3 es vulnerable a la inyección SQL a través de /admin/export_excel_user.php. • https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-export_excel_user.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

01 Apr 2024 — netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/address_interpret.php. netentsec NS-ASG 6.3 es vulnerable a la inyección SQL a través de /admin/address_interpret.php. • https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-address_interpret.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

01 Apr 2024 — netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/config_ISCGroupSSLCert.php. netentsec NS-ASG 6.3 es vulnerable a la inyección SQL a través de /admin/config_ISCGroupSSLCert.php. • https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-config_ISCGroupSSLCert.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

28 Mar 2024 — A vulnerability has been found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. This vulnerability affects unknown code of the file /protocol/log/listloginfo.php. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-listloginfo.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

28 Mar 2024 — A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_crl_conf. The manipulation of the argument CRLId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_crl_conf.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

19 Mar 2024 — A vulnerability has been found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /protocol/iscdevicestatus/deleteonlineuser.php. The manipulation of the argument messagecontent leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-deleteonlineuser.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

19 Mar 2024 — A vulnerability, which was classified as problematic, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /nac/naccheck.php. The manipulation of the argument username leads to improper neutralization of data within xpath expressions. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-naccheck.md • CWE-643: Improper Neutralization of Data within XPath Expressions ('XPath Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

19 Mar 2024 — A vulnerability, which was classified as critical, has been found in Netentsec NS-ASG Application Security Gateway 6.3. This issue affects some unknown processing of the file /admin/singlelogin.php. The manipulation of the argument loginId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/TronciuVlad/CVE-2024-26475 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

19 Mar 2024 — A vulnerability classified as critical was found in Netentsec NS-ASG Application Security Gateway 6.3. This vulnerability affects unknown code of the file /vpnweb/index.php?para=index. The manipulation of the argument check_VirtualSiteId leads to sql injection. The attack can be initiated remotely. • https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-index.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

19 Mar 2024 — A vulnerability classified as problematic has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /vpnweb/resetpwd/resetpwd.php. The manipulation of the argument UserId leads to improper neutralization of data within xpath expressions. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-laddfirewall.md • CWE-643: Improper Neutralization of Data within XPath Expressions ('XPath Injection') •