Sciencelogic

Sl1

27 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 19:15:13
  • Zuletzt bearbeitet 21.11.2024 07:33:34

A SQL injection vulnerability exists in the “ticket event report” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 19:15:13
  • Zuletzt bearbeitet 21.11.2024 07:33:34

A SQL injection vulnerability exists in the “ticket queue watchers” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being execut...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 19:15:13
  • Zuletzt bearbeitet 21.11.2024 07:33:34

A SQL injection vulnerability exists in the “ticket template watchers” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being exe...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 19:15:13
  • Zuletzt bearbeitet 21.11.2024 07:33:34

A SQL injection vulnerability exists in the “ticket watchers email” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being execut...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 19:15:13
  • Zuletzt bearbeitet 21.11.2024 07:33:33

A SQL injection vulnerability exists in the vendor_country parameter of the “vendor print report” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arb...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 19:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:33

A SQL injection vulnerability exists in the vendor_state parameter of the “vendor print report” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbit...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:33

A SQL injection vulnerability exists in the “admin dynamic app mib errors” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:33

A SQL injection vulnerability exists in the “reporting job editor” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being execute...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:33

A SQL injection vulnerability exists in the “schedule editor decoupled” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being ex...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:33

A SQL injection vulnerability exists in the “schedule editor” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed aga...