Логотип exploitDog
bind:CVE-2018-7768
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-7768

Количество 2

Количество 2

nvd логотип

CVE-2018-7768

больше 7 лет назад

The vulnerability exists within processing of loadtemplate.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the tpl input parameter.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gg8c-ccfv-g3xx

больше 3 лет назад

The vulnerability exists within processing of loadtemplate.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the tpl input parameter.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-7768

The vulnerability exists within processing of loadtemplate.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the tpl input parameter.

CVSS3: 8.8
0%
Низкий
больше 7 лет назад
github логотип
GHSA-gg8c-ccfv-g3xx

The vulnerability exists within processing of loadtemplate.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the tpl input parameter.

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу