Kategori: NIST-Güvenlik Açıkları

CVE-2022-48595

A SQL injection vulnerability exists in the “ticket template watchersâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48596

A SQL injection vulnerability exists in the “ticket queue watchersâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48597

A SQL injection vulnerability exists in the “ticket event reportâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48598

A SQL injection vulnerability exists in the “reporter events type dateâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly…

Devamını oku

CVE-2022-48599

A SQL injection vulnerability exists in the “reporter events typeâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48600

A SQL injection vulnerability exists in the “notes viewâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…

Devamını oku

CVE-2022-48591

A SQL injection vulnerability exists in the vendor_state parameter of the “vendor print reportâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and…

Devamını oku

CVE-2022-48587

A SQL injection vulnerability exists in the “schedule editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a…

Devamını oku

CVE-2022-48588

A SQL injection vulnerability exists in the “schedule editor decoupledâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku

CVE-2022-48589

A SQL injection vulnerability exists in the “reporting job editorâ€� feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to…

Devamını oku