Kategori: NIST-Təhlükəsizlik Zəiflikləri

CVE-2022-48597

A SQL injection vulnerability exists in the “ticket event reportâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48598

A SQL injection vulnerability exists in the “reporter events type dateâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly…

Devamını oku

CVE-2022-48599

A SQL injection vulnerability exists in the “reporter events typeâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48600

A SQL injection vulnerability exists in the “notes viewâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…

Devamını oku

CVE-2022-48591

A SQL injection vulnerability exists in the vendor_state parameter of the “vendor print reportâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and…

Devamını oku

CVE-2022-48587

A SQL injection vulnerability exists in the “schedule editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…

Devamını oku

CVE-2022-48588

A SQL injection vulnerability exists in the “schedule editor decoupledâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48589

A SQL injection vulnerability exists in the “reporting job editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48590

A SQL injection vulnerability exists in the “admin dynamic app mib errorsâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it…

Devamını oku

CVE-2022-48582

A command injection vulnerability exists in the ticket report generate feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly…

Devamını oku