Sciencelogic

Sl1

27 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:33:33

A SQL injection vulnerability exists in the “json walker” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:33:32

A SQL injection vulnerability exists in the “admin brand portal” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed ...

  • EPSS 0.41%
  • Veröffentlicht 09.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:33:32

A command injection vulnerability exists in the download and convert report feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to...

  • EPSS 0.41%
  • Veröffentlicht 09.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:33:32

A command injection vulnerability exists in the dashboard scheduler feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the und...

  • EPSS 0.41%
  • Veröffentlicht 09.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:33:32

A command injection vulnerability exists in the ticket report generate feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the ...

  • EPSS 0.41%
  • Veröffentlicht 09.08.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:33:32

A command injection vulnerability exists in the ARP ping device tool feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the un...

  • EPSS 0.41%
  • Veröffentlicht 09.08.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:33:32

A command injection vulnerability exists in the “dash export” feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlyin...