Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.
References
Link | Resource |
---|---|
http://www.kaoni.com/ | Vendor Advisory |
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2020-05-28 14:15
Updated : 2020-05-28 20:45
NVD link : CVE-2020-7812
Mitre link : CVE-2020-7812
CVE.ORG link : CVE-2020-7812
JSON object : View
Products Affected
microsoft
- windows
kaoni
- ezhttptrans
CWE
CWE-494
Download of Code Without Integrity Check