Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Schneider Electric SE | U.Motion | U.motion Builder Software, all versions prior to v1.3.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-7765.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet