Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.
References
Link | Resource |
---|---|
http://www.kaoni.com/ | Vendor Advisory |
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428 | Third Party Advisory |
http://www.kaoni.com/ | Vendor Advisory |
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.8 |
References | () http://www.kaoni.com/ - Vendor Advisory | |
References | () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428 - Third Party Advisory |
Information
Published : 2020-05-28 14:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7812
Mitre link : CVE-2020-7812
CVE.ORG link : CVE-2020-7812
JSON object : View
Products Affected
microsoft
- windows
kaoni
- ezhttptrans
CWE
CWE-494
Download of Code Without Integrity Check