Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51278 | A command injection vulnerability exists in the ticket report generate feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system. |
| Link | Providers |
|---|---|
| https://www.securifera.com/advisories/cve-2022-48582/ |
|
Thu, 10 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Securifera
Published:
Updated: 2024-10-10T14:53:17.188Z
Reserved: 2023-08-09T16:58:35.310Z
Link: CVE-2022-48582
Updated: 2024-08-03T15:17:54.825Z
Status : Modified
Published: 2023-08-09T18:15:11.073
Modified: 2024-11-21T07:33:32.480
Link: CVE-2022-48582
No data.
OpenCVE Enrichment
No data.
EUVD