Description
Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28744 | Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC. |
References
History
No history.
Status: PUBLISHED
Assigner: krcert
Published:
Updated: 2024-08-04T09:41:01.885Z
Reserved: 2020-01-22T00:00:00.000Z
Link: CVE-2020-7812
No data.
Status : Modified
Published: 2020-05-28T14:15:11.907
Modified: 2024-11-21T05:37:51.067
Link: CVE-2020-7812
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD