Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51280 | A command injection vulnerability exists in the download and convert report feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system. |
| Link | Providers |
|---|---|
| https://www.securifera.com/advisories/cve-2022-48584/ |
|
Thu, 10 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Securifera
Published:
Updated: 2024-10-10T14:51:50.315Z
Reserved: 2023-08-09T16:58:35.310Z
Link: CVE-2022-48584
Updated: 2024-08-03T15:17:55.540Z
Status : Modified
Published: 2023-08-09T18:15:11.287
Modified: 2024-11-21T07:33:32.767
Link: CVE-2022-48584
No data.
OpenCVE Enrichment
No data.
EUVD