Schneider-electric

U.Motion Builder

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.48%
  • Veröffentlicht 03.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:42

The vulnerability exists within processing of editscript.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A directory traversal vulnerability allows a caller with standard user privileges to write arbitrary php files anyw...

  • EPSS 0.35%
  • Veröffentlicht 03.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:42

The vulnerability exists within processing of xmlserver.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the id input parameter.

  • EPSS 0.35%
  • Veröffentlicht 03.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:41

The vulnerability exists within processing of editobject.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the type input parameter.

  • EPSS 0.35%
  • Veröffentlicht 03.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:41

The vulnerability exists within processing of track_getdata.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the id input parameter.

  • EPSS 0.23%
  • Veröffentlicht 03.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:41

The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.

  • EPSS 0.1%
  • Veröffentlicht 03.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:41

The vulnerability exists within runscript.php applet in Schneider Electric U.motion Builder software versions prior to v1.3.4. There is a directory traversal vulnerability in the processing of the 's' parameter of the applet.

  • EPSS 0.1%
  • Veröffentlicht 03.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:41

The vulnerability exists within css.inc.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The 'css' parameter contains a directory traversal vulnerability.

  • EPSS 0.34%
  • Veröffentlicht 26.09.2017 01:29:03
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A SQL injection vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which an unauthenticated user can use calls to various paths allowing performance of arbitrary SQL commands against the underlying data...

  • EPSS 0.24%
  • Veröffentlicht 26.09.2017 01:29:03
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An information disclosure vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system response to error provides more information than should be available to an unauthenticated user.

  • EPSS 0.06%
  • Veröffentlicht 26.09.2017 01:29:03
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system accepts reboot in session from unauthenticated users, supporting a denial of service condition.