mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
72 lines
2.4 KiB
JSON
72 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2020-10865",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to make arbitrary changes to the Components section of the Stats.ini file via RPC from a Low Integrity process."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://forum.avast.com/index.php?topic=232420.0",
|
|
"refsource": "MISC",
|
|
"name": "https://forum.avast.com/index.php?topic=232420.0"
|
|
},
|
|
{
|
|
"url": "https://forum.avast.com/index.php?topic=232423.0",
|
|
"refsource": "MISC",
|
|
"name": "https://forum.avast.com/index.php?topic=232423.0"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md",
|
|
"url": "https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md"
|
|
}
|
|
]
|
|
}
|
|
} |