Vulnerabilities (CVE)

Filtered by vendor Schneider-electric Subscribe
Filtered by product U.motion Builder
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-9959 1 Schneider-electric 1 U.motion Builder 2019-10-03 4.9 MEDIUM 5.5 MEDIUM
A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system accepts reboot in session from unauthenticated users, supporting a denial of service condition.
CVE-2018-7763 1 Schneider-electric 1 U.motion Builder 2018-08-28 4.3 MEDIUM 4.3 MEDIUM
The vulnerability exists within css.inc.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The 'css' parameter contains a directory traversal vulnerability.
CVE-2018-7787 1 Schneider-electric 1 U.motion Builder 2018-08-28 5.0 MEDIUM 5.3 MEDIUM
In Schneider Electric U.motion Builder software versions prior to v1.3.4, this vulnerability is due to improper validation of input of context parameter in HTTP GET request.
CVE-2018-7786 1 Schneider-electric 1 U.motion Builder 2018-08-28 4.3 MEDIUM 6.1 MEDIUM
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a cross site scripting (XSS) vulnerability exists which could allow injection of malicious scripts.
CVE-2018-7776 1 Schneider-electric 1 U.motion Builder 2018-08-28 4.3 MEDIUM 4.3 MEDIUM
The vulnerability exists within error.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. System information is returned to the attacker that contains sensitive data.
CVE-2018-7764 1 Schneider-electric 1 U.motion Builder 2018-08-28 4.3 MEDIUM 4.3 MEDIUM
The vulnerability exists within runscript.php applet in Schneider Electric U.motion Builder software versions prior to v1.3.4. There is a directory traversal vulnerability in the processing of the 's' parameter of the applet.
CVE-2017-9960 1 Schneider-electric 1 U.motion Builder 2017-09-27 5.0 MEDIUM 5.3 MEDIUM
An information disclosure vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system response to error provides more information than should be available to an unauthenticated user.