cvelist/2020/10xxx/CVE-2020-10867.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2020-03-23 16:01:26 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-04-01 18:01:15 +00:00
"ID": "CVE-2020-10867",
"STATE": "PUBLIC"
2020-03-23 16:01:26 +00:00
},
2020-04-01 18:01:15 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-03-23 16:01:26 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-04-01 18:01:15 +00:00
"value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to bypass intended access restrictions on tasks from an untrusted process, when Self Defense is enabled."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://forum.avast.com/index.php?topic=232420.0",
"refsource": "MISC",
"name": "https://forum.avast.com/index.php?topic=232420.0"
},
{
"url": "https://forum.avast.com/index.php?topic=232423.0",
"refsource": "MISC",
"name": "https://forum.avast.com/index.php?topic=232423.0"
},
{
"refsource": "MISC",
"name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md",
"url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md"
2020-03-23 16:01:26 +00:00
}
]
}
}