{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T06:39:31.939","vulnerabilities":[{"cve":{"id":"CVE-2020-7862","sourceIdentifier":"vuln@krcert.or.kr","published":"2021-06-24T11:15:07.740","lastModified":"2024-11-21T05:37:56.020","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in agent program of HelpU remote control solution could allow an authenticated remote attacker to execute arbitrary commands This vulnerability is due to insufficient input santization when communicating customer process."},{"lang":"es","value":"Una vulnerabilidad solución de control remoto en el programa agente de HelpU, podría permitir a un atacante remoto autenticado ejecutar comandos arbitrarios. Esta vulnerabilidad es debido a un saneamiento insuficiente de la entrada cuando se comunica el proceso del cliente"}],"metrics":{"cvssMetricV31":[{"source":"vuln@krcert.or.kr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"vuln@krcert.or.kr","type":"Secondary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-120"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:helpu:helpuftclient:3.0.0.0:*:*:*:*:windows:*:*","matchCriteriaId":"D65D63E5-9478-4CB5-ABEC-58A6AB4D8241"},{"vulnerable":true,"criteria":"cpe:2.3:a:helpu:helpuftserver:3.0.0.0:*:*:*:*:windows:*:*","matchCriteriaId":"51FCBC1B-E6C0-481A-AA65-4F6A14C5E5ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:helpu:helpuserver:1.0.0.2:*:*:*:*:windows:*:*","matchCriteriaId":"2F92BEDB-C1B4-4FD4-8540-A5090EF64F52"},{"vulnerable":true,"criteria":"cpe:2.3:a:helpu:helpuviewer:2018.5.21.0:*:*:*:*:windows:*:*","matchCriteriaId":"6DA81C9C-27A9-4BA9-AECD-8BFDCA46C13D"}]}]}],"references":[{"url":"https://helpu.co.kr/customer/download.html","source":"vuln@krcert.or.kr","tags":["Vendor Advisory"]},{"url":"https://krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36094","source":"vuln@krcert.or.kr","tags":["Third Party Advisory"]},{"url":"https://helpu.co.kr/customer/download.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36094","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}