The vulnerability exists within processing of editobject.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the type input parameter.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-19479 | The vulnerability exists within processing of editobject.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the type input parameter. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: schneider
Published:
Updated: 2024-09-17T02:42:36.746Z
Reserved: 2018-03-08T00:00:00
Link: CVE-2018-7767
No data.
Status : Modified
Published: 2018-07-03T14:29:00.697
Modified: 2024-11-21T04:12:41.943
Link: CVE-2018-7767
No data.
OpenCVE Enrichment
No data.
EUVD