CVE-2020-7821
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
02/07/2020
Last modified:
14/07/2020
Description
Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a vulnerability that could allow remote attacker to execute arbitrary code by modifying the value of registry path. This can be leveraged for code execution by rebooting the victim’s PC
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nexaweb:nexacro_14:*:*:*:*:*:*:*:* | 2019.9.6 (excluding) | |
| cpe:2.3:a:nexaweb:nexacro_17:*:*:*:*:*:*:*:* | 2019.9.6 (excluding) | |
| cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



