ZDI-17-387: (0Day) Schneider Electric U.motion Builder SOAP Request Remote SQL Command Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary SQL commands on vulnerable installations of Schneider Electric U.Motion Builder. Authentication is not required to exploit this vulnerability.

from ZDI: Published Advisories http://ift.tt/2sfAOeG

No comments:

Post a Comment

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads...