CVE-2020-7821

Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a vulnerability that could allow remote attacker to execute arbitrary code by modifying the value of registry path. This can be leveraged for code execution by rebooting the victim’s PC
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:nexaweb:nexacro_14:*:*:*:*:*:*:*:*
cpe:2.3:a:nexaweb:nexacro_17:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
References () http://support.tobesoft.co.kr/Support/index.html - Third Party Advisory () http://support.tobesoft.co.kr/Support/index.html - Third Party Advisory
References () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35491 - Third Party Advisory () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35491 - Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.8

Information

Published : 2020-07-02 13:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7821

Mitre link : CVE-2020-7821

CVE.ORG link : CVE-2020-7821


JSON object : View

Products Affected

nexaweb

  • nexacro_14
  • nexacro_17

microsoft

  • windows
CWE
CWE-20

Improper Input Validation