Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.
References
Link | Resource |
---|---|
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428 | Third Party Advisory |
http://www.kaoni.com/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-05-28 07:15
Updated : 2020-05-28 13:45
NVD link : CVE-2020-7812
Mitre link : CVE-2020-7812
JSON object : View
CWE
CWE-494
Download of Code Without Integrity Check
Products Affected
microsoft
- windows
kaoni
- ezhttptrans