[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-22683":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":47},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":44,"name":45,"published":46,"updated":27},22683,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},2,"Nuclei",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":37,"epss_score":38,"epss_percentile":39,"cve":40,"in_cisa_catalog":42,"date":43,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"critical","Successful exploitation could lead to unauthorized access to sensitive information.","SQL injection vulnerability in Nagios XI before version 5.11.3 via the bulk modification tool.","Apply the vendor-supplied patch or upgrade to a non-vulnerable version.",[33,34,35,36],"https://github.com/bucketcat/CVE-2023-48084","https://github.com/Hamibubu/CVE-2023-48084","https://nvd.nist.gov/vuln/detail/CVE-2023-48084","https://github.com/nomi-sec/PoC-in-GitHub",9.8,0.82094,0.99206,[41],"CVE-2023-48084",false,"2023-12-14T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2023-48084","Nagios XI \u003C 5.11.3 - SQL Injection","2024-05-25T00:00:00Z",["Island",48],{"key":49,"params":50,"result":52},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":51},"{\"text-color\":\"gray\"}",{"head":53},{}]