### [CVE-2007-1493](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1493) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description nukesentinel.php in NukeSentinel 2.5.06 and earlier uses a permissive regular expression to validate an IP address, which allows remote attackers to execute arbitrary SQL commands via the Client-IP HTTP header, due to an incomplete patch for CVE-2007-1172. ### POC #### Reference - http://securityreason.com/securityalert/2430 #### Github No PoCs found on GitHub currently.