Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-26625 | 2 Microsoft, Tobesoft | 2 Windows, Nexacro | 2022-04-27 | 6.8 MEDIUM | 8.8 HIGH |
Insufficient Verification of input Data leading to arbitrary file download and execute was discovered in Nexacro platform. This vulnerability is caused by an automatic update function that does not verify input data except version information. Remote attackers can use this incomplete validation logic to download and execute arbitrary malicious file. | |||||
CVE-2021-26613 | 2 Microsoft, Tobesoft | 2 Windows, Nexacro | 2022-02-15 | 5.0 MEDIUM | 7.5 HIGH |
improper input validation vulnerability in nexacro permits copying file to the startup folder using rename method. | |||||
CVE-2021-26612 | 2 Microsoft, Tobesoft | 2 Windows, Nexacro | 2021-12-01 | 7.5 HIGH | 9.8 CRITICAL |
An improper input validation leading to arbitrary file creation was discovered in copy method of Nexacro platform. Remote attackers use copy method to execute arbitrary command after the file creation included malicious code. | |||||
CVE-2021-26607 | 2 Microsoft, Tobesoft | 2 Windows, Nexacro | 2021-11-01 | 10.0 HIGH | 9.8 CRITICAL |
An Improper input validation in execDefaultBrowser method of NEXACRO17 allows a remote attacker to execute arbitrary command on affected systems. | |||||
CVE-2020-7874 | 2 Microsoft, Tobesoft | 2 Windows, Nexacro | 2021-09-22 | 6.8 MEDIUM | 8.8 HIGH |
Download of code without integrity check vulnerability in NEXACRO14 Runtime ActiveX control of tobesoft Co., Ltd allows the attacker to cause an arbitrary file download and execution. This vulnerability is due to incomplete validation of file download URL or file extension. | |||||
CVE-2019-19167 | 2 Microsoft, Tobesoft | 2 Windows, Nexacro | 2020-05-11 | 7.5 HIGH | 9.8 CRITICAL |
Tobesoft Nexacro v2019.9.25.1 and earlier version have an arbitrary code execution vulnerability by using method supported by Nexacro14 ActiveX Control. It allows attacker to cause remote code execution. |