[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-7745":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":48,"name":49,"published":50,"updated":34},7745,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":42,"epss_score":43,"epss_percentile":44,"cve":45,"in_cisa_catalog":47,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"critical","The ECAVA IntegraXor web server has parameters that are vulnerable to SQL injection. If the queries are not sanitized, the hosts database could be subject to read, write, and delete commands. A successful exploit of this vulnerability could lead to arbitrary data leakage, data manipulation, and remote code execution.","ECAVA IntegraXor is prone to a SQL injection (SQLi) vulnerability.","Update to version 5.2.722.2 or later.",[40,41],"https://ics-cert.us-cert.gov/advisories/ICSA-17-031-02","http://www.securityfocus.com/bid/95907",9.8,0.00281,0.51467,[46],"CVE-2016-8341",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.106607","ECAVA IntegraXor \u003C= 5.0.413.0 SQLi Vulnerability","2018-01-02T00:00:00Z"]