CVE-2020-7812

Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:kaoni:ezhttptrans:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.8
References () http://www.kaoni.com/ - Vendor Advisory () http://www.kaoni.com/ - Vendor Advisory
References () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428 - Third Party Advisory () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428 - Third Party Advisory

Information

Published : 2020-05-28 14:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7812

Mitre link : CVE-2020-7812

CVE.ORG link : CVE-2020-7812


JSON object : View

Products Affected

microsoft

  • windows

kaoni

  • ezhttptrans
CWE
CWE-494

Download of Code Without Integrity Check