An attacker may be able to execute malicious actions due to the lack of device access protections and device permissions when using the web application. This could lead to uploading python files which can be later executed.
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2022-08-09T20:18:31.257Z

Updated: 2025-04-16T16:13:37.837Z

Reserved: 2022-08-02T00:00:00.000Z

Link: CVE-2022-2634

cve-icon Vulnrichment

Updated: 2024-08-03T00:46:03.490Z

cve-icon NVD

Status : Modified

Published: 2022-08-10T20:15:36.597

Modified: 2024-11-21T07:01:24.657

Link: CVE-2022-2634

cve-icon Redhat

No data.