{"id":"CVE-2020-16143","details":"The seafile-client client 7.0.8 for Seafile is vulnerable to DLL hijacking because it loads exchndl.dll from the current working directory.","modified":"2026-04-10T04:23:47.974687Z","published":"2020-07-29T22:15:12.277Z","references":[{"type":"REPORT","url":"https://github.com/haiwen/seafile-client/issues/1309"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/haiwen/seafile-client","events":[{"introduced":"0"},{"last_affected":"71219b96716bee2319b5b9edc75e1e963ad0105b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0.8"}]}}],"versions":["2.0.4","client-2.0.3","v2.0.5","v2.0.6","v2.0.7","v2.0.8","v2.1.1","v2.1.1-testing","v2.1.2","v2.1.2-mac","v3.0.0","v3.0.0-testing","v3.0.1-mac","v3.0.2","v3.0.2-testing","v3.0.4","v3.0.4-mac","v3.0.4-testing","v3.1.0-testing","v3.1.1-testing","v3.1.2-testing","v3.1.3-testing","v3.1.4","v3.1.5","v3.1.5-testing","v3.1.6","v3.1.6-testing","v3.1.7","v3.1.7-testing","v4.0.0","v4.0.1","v4.0.2","v4.0.5","v4.2.0","v4.2.1","v4.2.2","v4.2.3","v4.2.4","v4.2.5","v4.2.6-bak","v4.2.7","v4.2.8","v4.3.1","v4.3.2","v4.3.3-testing","v4.4.0","v4.4.1","v4.4.2","v5.0.0","v5.0.1","v5.0.2","v5.0.3","v5.0.4","v5.0.5","v5.0.6","v5.0.7","v5.1.0","v5.1.1","v5.1.2","v5.1.3","v5.1.4","v6.0.0","v6.0.1","v6.0.3","v6.0.4","v6.0.6","v6.0.7","v6.1.1","v6.1.2","v6.1.3","v6.1.4","v6.1.5","v6.1.6","v6.1.7","v6.1.8","v6.2.0","v6.2.1","v6.2.10","v6.2.11","v6.2.2","v6.2.3","v6.2.4","v6.2.4-testing","v6.2.5","v6.2.7","v6.2.8","v6.2.9","v7.0.0","v7.0.1","v7.0.2","v7.0.3","v7.0.4","v7.0.7","v7.0.8","v7.0.8-testing"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-16143.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}