An attacker using SQL injection may use arguments to construct queries 
without proper sanitization. The DBVisitor.dll is exposed through SOAP 
interfaces, and the exposed functions are vulnerable to SOAP injection. 
This may allow unexpected SQL action and access to records in the table 
of the software database or execution of arbitrary code.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    19 Sep 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) An attacker using SQL injection may use arguments to construct queries without proper sanitization. The DBVisitor.dll is exposed through SOAP interfaces, and the exposed functions are vulnerable to SOAP injection. This may allow unexpected SQL action and access to records in the table of the software database or execution of arbitrary code. | |
| References | 
 | 
21 Nov 2024, 02:02
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-079-03 - US Government Resource | |
| References | () http://www.securityfocus.com/bid/66740 - | 
Information
                Published : 2014-04-12 04:37
Updated : 2025-09-19 19:15
NVD link : CVE-2014-0763
Mitre link : CVE-2014-0763
CVE.ORG link : CVE-2014-0763
JSON object : View
Products Affected
                advantech
- advantech_webaccess
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
