CVE-2022-48596
A SQL injection vulnerability exists in the “ticket queue watchersâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the “ticket queue watchersâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the “ticket template watchersâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the “ticket watchers emailâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the “topology data serviceâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the vendor_country parameter of the “vendor print reportâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and…
A SQL injection vulnerability exists in the vendor_state parameter of the “vendor print reportâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and…
A SQL injection vulnerability exists in the “admin dynamic app mib errorsâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it…
A SQL injection vulnerability exists in the “reporting job editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the “schedule editor decoupledâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the “schedule editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…