CVE-2010-3162

Untrusted search path vulnerability in Apsaly before 3.74 allows local users to gain privileges via a Trojan horse executable file in the current working directory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:masahiko_watanabe:apsaly:*:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:1.20:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:1.40:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.00:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.10:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.20:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.30:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.40:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.50:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.60:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.70:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:2.72:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:3.00:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:3.10:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:3.40:*:*:*:*:*:*:*
cpe:2.3:a:masahiko_watanabe:apsaly:3.60:*:*:*:*:*:*:*

History

21 Nov 2024, 01:18

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN71138390/index.html - () http://jvn.jp/en/jp/JVN71138390/index.html -
References () http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000046.html - () http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000046.html -
References () http://www.venus.dti.ne.jp/mw31/apsaly/Vulnerability.html - Patch () http://www.venus.dti.ne.jp/mw31/apsaly/Vulnerability.html - Patch

Information

Published : 2010-10-25 20:01

Updated : 2025-04-11 00:51


NVD link : CVE-2010-3162

Mitre link : CVE-2010-3162

CVE.ORG link : CVE-2010-3162


JSON object : View

Products Affected

masahiko_watanabe

  • apsaly