Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Tobesoft Subscribe
Filtered by product Nexacro
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-26625 2 Microsoft, Tobesoft 2 Windows, Nexacro 2022-04-27 6.8 MEDIUM 8.8 HIGH
Insufficient Verification of input Data leading to arbitrary file download and execute was discovered in Nexacro platform. This vulnerability is caused by an automatic update function that does not verify input data except version information. Remote attackers can use this incomplete validation logic to download and execute arbitrary malicious file.
CVE-2021-26613 2 Microsoft, Tobesoft 2 Windows, Nexacro 2022-02-15 5.0 MEDIUM 7.5 HIGH
improper input validation vulnerability in nexacro permits copying file to the startup folder using rename method.
CVE-2021-26612 2 Microsoft, Tobesoft 2 Windows, Nexacro 2021-12-01 7.5 HIGH 9.8 CRITICAL
An improper input validation leading to arbitrary file creation was discovered in copy method of Nexacro platform. Remote attackers use copy method to execute arbitrary command after the file creation included malicious code.
CVE-2021-26607 2 Microsoft, Tobesoft 2 Windows, Nexacro 2021-11-01 10.0 HIGH 9.8 CRITICAL
An Improper input validation in execDefaultBrowser method of NEXACRO17 allows a remote attacker to execute arbitrary command on affected systems.
CVE-2020-7874 2 Microsoft, Tobesoft 2 Windows, Nexacro 2021-09-22 6.8 MEDIUM 8.8 HIGH
Download of code without integrity check vulnerability in NEXACRO14 Runtime ActiveX control of tobesoft Co., Ltd allows the attacker to cause an arbitrary file download and execution. This vulnerability is due to incomplete validation of file download URL or file extension.
CVE-2019-19167 2 Microsoft, Tobesoft 2 Windows, Nexacro 2020-05-11 7.5 HIGH 9.8 CRITICAL
Tobesoft Nexacro v2019.9.25.1 and earlier version have an arbitrary code execution vulnerability by using method supported by Nexacro14 ActiveX Control. It allows attacker to cause remote code execution.