Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51277 | A command injection vulnerability exists in the “dash export” feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system. |
| Link | Providers |
|---|---|
| https://www.securifera.com/advisories/cve-2022-48581/ |
|
Thu, 10 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Securifera
Published:
Updated: 2024-10-10T14:53:54.089Z
Reserved: 2023-08-09T16:58:35.310Z
Link: CVE-2022-48581
Updated: 2024-08-03T15:17:55.344Z
Status : Modified
Published: 2023-08-09T18:15:10.960
Modified: 2024-11-21T07:33:32.340
Link: CVE-2022-48581
No data.
OpenCVE Enrichment
No data.
EUVD