An attacker using SQL injection may use arguments to construct queries
without proper sanitization. The DBVisitor.dll is exposed through SOAP
interfaces, and the exposed functions are vulnerable to SOAP injection.
This may allow unexpected SQL action and access to records in the table
of the software database or execution of arbitrary code.
References
Configurations
Configuration 1 (hide)
|
History
19 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An attacker using SQL injection may use arguments to construct queries without proper sanitization. The DBVisitor.dll is exposed through SOAP interfaces, and the exposed functions are vulnerable to SOAP injection. This may allow unexpected SQL action and access to records in the table of the software database or execution of arbitrary code. | |
References |
|
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 - US Government Resource | |
References | () http://www.securityfocus.com/bid/66740 - |
Information
Published : 2014-04-12 04:37
Updated : 2025-09-19 19:15
NVD link : CVE-2014-0763
Mitre link : CVE-2014-0763
CVE.ORG link : CVE-2014-0763
JSON object : View
Products Affected
advantech
- advantech_webaccess
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')