{"id":"CVE-2022-29851","details":"documentconverter in OX App Suite through 7.10.6, in a non-default configuration with ghostscript, allows OS Command Injection because file conversion may occur for an EPS document that is disguised as a PDF document.","modified":"2026-04-12T06:00:33.608298Z","published":"2022-10-25T17:15:51.937Z","references":[{"type":"ADVISORY","url":"https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/open-xchange/appsuite-frontend","events":[{"introduced":"0"},{"last_affected":"489e7d0bf2bb0dc4c984860c4ce6f4d772086875"}],"database_specific":{"cpe":"cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"7.10.6"}],"source":"CPE_FIELD"}}],"versions":["7.10.0-0","7.10.0-2","7.10.3-0","7.10.4-0","7.10.4-1","7.10.5-0","7.10.5-1","7.10.5-2","7.10.6-0","as-next"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-29851.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}