Vulnerability Details : CVE-2020-7813
Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download and execute arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution.
Products affected by CVE-2020-7813
- cpe:2.3:a:kaoni:ezhttptrans:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7813
2.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7813
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
KrCERT/CC |
CWE ids for CVE-2020-7813
-
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.Assigned by:
- nvd@nist.gov (Primary)
- vuln@krcert.or.kr (Secondary)
References for CVE-2020-7813
-
http://www.kaoni.com/
가온아이Product
-
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35428
KrCERT/CC - KISA 인터넷 보호나라&KrCERTThird Party Advisory
Jump to