CVE-2022-48600
A SQL injection vulnerability exists in the “notes viewâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…
A SQL injection vulnerability exists in the “notes viewâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…
A SQL injection vulnerability exists in the vendor_state parameter of the “vendor print reportâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and…
A SQL injection vulnerability exists in the “schedule editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…
A SQL injection vulnerability exists in the “schedule editor decoupledâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the “reporting job editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…
A SQL injection vulnerability exists in the “admin dynamic app mib errorsâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it…
A command injection vulnerability exists in the ticket report generate feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly…
A command injection vulnerability exists in the dashboard scheduler feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…
A command injection vulnerability exists in the download and convert report feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly…
A SQL injection vulnerability exists in the “admin brand portalâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…