cvelist/2020/7xxx/CVE-2020-7826.json

85 lines
2.8 KiB
JSON
Raw Normal View History

2020-01-22 14:01:07 +00:00
{
"CVE_data_meta": {
2020-07-17 16:01:19 +00:00
"ASSIGNER": "vuln@krcert.or.kr",
"DATE_PUBLIC": "2020-07-15T05:07:00.000Z",
2020-01-22 14:01:07 +00:00
"ID": "CVE-2020-7826",
2020-07-17 16:01:19 +00:00
"STATE": "PUBLIC"
2020-01-22 14:01:07 +00:00
},
2020-07-17 16:01:19 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Bflysoft",
"product": {
"product_data": [
{
"product_name": "EyeSurfer BflyInstallerX.ocx",
"version": {
"version_data": [
{
"version_value": "1.0.0.16 and earlier versions"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-01-22 14:01:07 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-07-17 16:01:19 +00:00
"value": "EyeSurfer BflyInstallerX.ocx v1.0.0.16 and earlier versions contain a vulnerability that could allow remote files to be download by setting the arguments to the vulnerable method. This can be leveraged for code execution. When the vulnerable method is called, they fail to properly check the parameters that are passed to it."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-494 Download of Code Without Integrity Check"
}
]
2020-01-22 14:01:07 +00:00
}
]
2020-07-17 16:01:19 +00:00
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35512",
"url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35512"
}
]
},
"source": {
"discovery": "UNKNOWN"
2020-01-22 14:01:07 +00:00
}
}