7.5
CVE-2014-0763
- EPSS 42.77%
- Veröffentlicht 12.04.2014 04:37:31
- Zuletzt bearbeitet 19.09.2025 19:15:37
- Quelle ics-cert@hq.dhs.gov
- Teams Watchlist Login
- Unerledigt Login
An attacker using SQL injection may use arguments to construct queries without proper sanitization. The DBVisitor.dll is exposed through SOAP interfaces, and the exposed functions are vulnerable to SOAP injection. This may allow unexpected SQL action and access to records in the table of the software database or execution of arbitrary code.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Advantech ≫ Advantech Webaccess Version <= 7.1
Advantech ≫ Advantech Webaccess Version5.0
Advantech ≫ Advantech Webaccess Version6.0
Advantech ≫ Advantech Webaccess Version7.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 42.77% | 0.974 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
ics-cert@hq.dhs.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.