mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 01:40:20 +00:00
Update GobyVuls-Document.md
This commit is contained in:
parent
d926a3cf0e
commit
dbe3b06c62
@ -2,7 +2,21 @@
|
||||
The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing.
|
||||
|
||||
|
||||
**Updated document date: May 23, 2024**
|
||||
**Updated document date: May 30, 2024**
|
||||
|
||||
## CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919)
|
||||
|
||||
| **Vulnerability** | CheckPoint Gateway /clients/MyCRL File Reading Vulnerability(CVE-2024-24919) |
|
||||
| :----: | :-----|
|
||||
| **Chinese name** | CheckPoint Gateway /clients/MyCRL 文件读取漏洞(CVE-2024-24919) |
|
||||
| **CVSS core** | 7.5 |
|
||||
| **FOFA Query** (click to view the results directly)| [ app="Check_Point-SSL-Extender"](https://en.fofa.info/result?qbase64=Ym9keT0iL25leHVzLSIgJiYgYm9keT0iUmVwb3NpdG9yeSI%3D)|
|
||||
| **Number of assets affected** | 77631 |
|
||||
| **Description** | CheckPoint Gateway is a network security device developed by CheckPoint Software Technology Company, which is mainly used to protect network infrastructure from various network threats.There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.|
|
||||
| **Impact** | There is a file reading vulnerability under the CheckPoint Gateway /clients/MyCRL path. The attacker can construct a malicious request to traverse the file on the system, causing sensitive information leakage.|
|
||||
|
||||

|
||||
|
||||
|
||||
## Sonatype Nexus Repository Manager File Read Vulnerability(CVE-2024-4956)
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user