{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T10:10:51.246","vulnerabilities":[{"cve":{"id":"CVE-2014-9190","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2015-01-10T02:59:33.693","lastModified":"2025-07-24T23:15:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Stack-based buffer overflow in Schneider Electric Wonderware InTouch Access Anywhere Server 10.6 and 11.0 allows remote attackers to execute arbitrary code via a request for a filename that does not exist."},{"lang":"es","value":"Desbordamiento de buffer basado en pila en Schneider Electric Wonderware InTouch Access Anywhere Server 10.6 y 11.0 permite a atacantes remotos ejecutar código arbitrario a través de una solicitud para un nombre de fichero que no existe."}],"metrics":{"cvssMetricV2":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:wonderware_intouch_access_anywhere_server:10.6:*:*:*:*:*:*:*","matchCriteriaId":"2AE0E526-3CE4-4A10-8AB9-8EF49BBCD6A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:schneider-electric:wonderware_intouch_access_anywhere_server:11.0:*:*:*:*:*:*:*","matchCriteriaId":"91E7EF43-1696-4E8A-BEDB-72E5E230FAE0"}]}]}],"references":[{"url":"https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000104.pdf","source":"ics-cert@hq.dhs.gov"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-15-008-02","source":"ics-cert@hq.dhs.gov"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-15-008-02","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://wdnresource.wonderware.com/support/docs/_SecurityBulletins/Security_Bulletin_LFSEC00000104.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}