Printchaser v2.2021.804.1 and earlier versions contain a vulnerability, which could allow remote attacker to download and execute remote file by setting the argument, variable in the activeX module. This can be leveraged for code execution.
References
Link | Resource |
---|---|
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36350 | Third Party Advisory |
https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36350 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36350 - Third Party Advisory |
Information
Published : 2021-12-28 20:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7883
Mitre link : CVE-2020-7883
CVE.ORG link : CVE-2020-7883
JSON object : View
Products Affected
microsoft
- windows
wowsoft
- printchaser
CWE
CWE-494
Download of Code Without Integrity Check