
CVE-2020-7863 – Raonwiz RAON K Upload Arbitrary Command Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-7863
05 Aug 2021 — A vulnerability in File Transfer Solution of Raonwiz could allow arbitrary command execution as the result of viewing a specially-crafted web page. This vulnerability is due to insufficient validation of the parameter of the specific method. An attacker could exploit this vulnerability by setting the parameter to the command they want to execute. A successful exploit could allow the attacker to execute arbitrary commands on a target system as the user. However, the victim must run the Internet Explorer brow... • http://www.raonk.com/page/customs/modify.aspx?pSeq=20&pageno=1 • CWE-20: Improper Input Validation •

CVE-2020-29157
https://notcve.org/view.php?id=CVE-2020-29157
14 Jul 2021 — An issue in RAONWIZ K Editor v2018.0.0.10 allows attackers to perform a DLL hijacking attack when the service or system is restarted. Un problema en RAONWIZ K Editor versión v2018.0.0.10, permite a atacantes llevar a cabo un ataque de secuestro DLL cuando es reiniciado el servicio o el sistema • https://docs.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order • CWE-427: Uncontrolled Search Path Element •

CVE-2020-7830
https://notcve.org/view.php?id=CVE-2020-7830
02 Sep 2020 — RAONWIZ v2018.0.2.50 and earlier versions contains a vulnerability that could allow remote files to be downloaded by lack of validation. Vulnerabilities in downloading with Kupload agent allow files to be downloaded to arbitrary paths due to insufficient verification of extensions and download paths. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions and earlier. RAONWIZ versiones v2018.0.2.50 y anteriores, contienen una vulnerabilidad que podría permitir la descarga de archivos remotos por una f... • https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582 • CWE-20: Improper Input Validation •

CVE-2020-7817
https://notcve.org/view.php?id=CVE-2020-7817
06 Aug 2020 — MyBrowserPlus downloads the files needed to run the program through the setup file (Setup.inf). At this time, there is a vulnerability in downloading arbitrary files due to insufficient integrity verification of the files. MyBrowserPlus descarga los archivos necesarios para ejecutar el programa por medio del archivo de instalación (Setup.inf). En este momento, se presenta una vulnerabilidad en la descarga de archivos arbitrarios debido a una verificación de integridad insuficiente de los archivos • http://www.activesoft.co.kr/demo.html • CWE-494: Download of Code Without Integrity Check •

CVE-2020-7814
https://notcve.org/view.php?id=CVE-2020-7814
10 Jul 2020 — RAONWIZ v2018.0.2.50 and eariler versions contains a vulnerability that could allow remote files to be downloaded and excuted by lack of validation to file extension, witch can used as remote-code-excution attacks by hackers File download & execution vulnerability in ____COMPONENT____ of RAONWIZ RAON KUpload allows ____ATTACKER/ATTACK____ to cause ____IMPACT____. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions prior to 2018.0.2.51 on Windows. RAONWIZ versiones v2018.0.2.50 y anteriores, contie... • https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35495 • CWE-20: Improper Input Validation •

CVE-2020-7808 – RAONWIZ Inc K Upload, arguments modiffication via missing support for integrity check vulnerability
https://notcve.org/view.php?id=CVE-2020-7808
21 May 2020 — In RAONWIZ K Upload v2018.0.2.51 and prior, automatic update processing without integrity check on update module(web.js) allows an attacker to modify arguments which causes downloading a random DLL and injection on it. En RAONWIZ K Upload v2018.0.2.51 y anteriores, el proceso de actualización automática sin verificación de integridad en el módulo de actualización (web.js) permite a un atacante modificar argumentos que provocan la descarga de una DLL aleatoria y la inyección en él. • https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35424 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') CWE-353: Missing Support for Integrity Check •

CVE-2019-19164 – Dext5 Upload ActiveX Arbitrary File Execution Vulnerability
https://notcve.org/view.php?id=CVE-2019-19164
07 May 2020 — dext5.ocx ActiveX Control in Dext5 Upload 5.0.0.112 and earlier versions contains a vulnerability that could allow remote files to be executed by setting the arguments to the activex method. A remote attacker could induce a user to access a crafted web page, causing damage such as malicious code infection. dext5.ocx ActiveX Control en Dext5 Upload versión 5.0.0.112 y versiones anteriores, contiene una vulnerabilidad que podría permitir que archivos remotos sean ejecutados mediante la configuración de los ar... • http://www.dext5.com/page/support/notice_view.aspx?pSeq=23 • CWE-20: Improper Input Validation •

CVE-2019-19168
https://notcve.org/view.php?id=CVE-2019-19168
06 May 2020 — Dext5.ocx ActiveX 5.0.0.116 and eariler versions contain a vulnerability, which could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution. Dext5.ocx ActiveX versiones 5.0.0.116 y anteriores, contiene una vulnerabilidad que podría permitir a un atacante remoto descargar y ejecutar archivos arbitrarios remotos al configurar los argumentos en el método activex. Esto puede ser aprovechado para una ejecución ... • http://www.dext5.com/page/support/notice_view.aspx?pSeq=26 •

CVE-2019-19169
https://notcve.org/view.php?id=CVE-2019-19169
06 May 2020 — Dext5.ocx ActiveX 5.0.0.116 and eariler versions contain a vulnerability, which could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution. Dext5.ocx ActiveX versiones 5.0.0.116 y anteriores, contiene una vulnerabilidad que podría permitir a un atacante remoto descargar un archivo arbitrario al configurar los argumentos en el método activex. Esto puede ser aprovechado para una ejecución de código. • http://www.dext5.com/page/support/notice_view.aspx?pSeq=26 •