An attacker may be able to execute malicious actions due to the lack of device access protections and device permissions when using the web application. This could lead to uploading python files which can be later executed.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2022-08-09T20:18:31.257922Z

Updated: 2024-09-16T20:43:04.145Z

Reserved: 2022-08-02T00:00:00

Link: CVE-2022-2634

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2022-08-10T20:15:36.597

Modified: 2022-08-16T11:57:53.887

Link: CVE-2022-2634

cve-icon Redhat

No data.